Keeping the Zero Trust Picture for Businesses in Focus

Author Avatar


Posted on November 1, 2021

Want to interview David?


The recently issued Gartner “Quick Answer” on explaining Zero Trust to technical executive leaders presents important points on examining Zero Trust concepts through a business lens. Equally, for those of us who live, eat and breathe cybersecurity, it is an essential reminder that others do not do the same, despite the daily drumbeat of news about advanced cyberattacks.

Hopefully some of the elevated attention during Cybersecurity Awareness Month, served as a reminder that strong cybersecurity is most of all a good business practice. Adopting a Zero Trust security approach confers productivity, usability and security advantages on organizations even if they are never successfully attacked. It increases business resilience and improves organizations’ ability to rapidly adapt to the dynamic information technology landscape.

Increasing cyber-resilience – the ability to bounce back in the event of an attack – benefits organizations by minimizing operational downtime, recovery costs, costs of lost business, reputational damage and if customer data is breached, possible legal action.

Here is our take on a number of important points from the Gartner research note.

Don’t assume familiarity

Once an idea achieves a certain level of ubiquity, precise meanings may be lost in a haze of presumed familiarity. By now, few individuals who are concerned about threats to their business can have avoided the term “Zero Trust.” After all, a quick Google search turns up 880 million “Zero Trust” results and it is featured prominently on the home pages of every self-respecting cybersecurity industry player. Precisely because of the ubiquity of the term, however, it is unlikely that many of the places it’s featured includes a precise definition of Zero Trust.

That means that most business leaders, even those who are cybersecurity-savvy, know that Zero Trust is important, but it’s likely that many do not know precisely what it is and therefore why it’s important.

Zero Trust is shorthand for zero implicit trust

Many of us have been throwing around the term “Zero Trust” for so long that we have lost sight of how puzzling – even paradoxical – it is. After all, don’t organizations want to fully trust that they are protected? When talking security with business leaders, it is therefore essential to start with the fact that almost all organizations have, until now, operated with a high degree of implicit trust. And that implicit trust is what Zero Trust aims to eliminate – zero out – in favor of explicit trust, through identity/context verification and least privilege access.

Zero Trust is an approach, not a product

Zero Trust involves a permanent change in the way companies approach privilege and risk. Products and platforms enable the operational transformation, but the first transformation must be in mindset: Understanding what must be protected – which has changed drastically in recent years – and aligning leadership attitudes toward trust.

Zero Trust is only effective with detailed ground-level change

The real work of Zero Trust is neither conceptual nor acquisitive. It is in the nitty-gritty details of understanding workflows, classifying data and critical assets, identifying and eliminating excessive privileges, and building and implementing policies and processes that adaptively translate those understandings into controls. True commitment to a Zero Trust security approach takes time, patience, deep understanding of business processes and cooperation at every level of the organizational structure.

Zero Trust architectures reduce risk of attack, severity, recovery time and costs

It stands to reason that if there are strict, well-enforced limits and conditions on which individuals and devices can access specific resources, penetration attempts are less likely to succeed. Further limitations on the specific resources available to each verified individual – AKA least-privilege access – limits the scope and severity of breaches, should they occur. Finally, the “assume breach” pillar of the Zero Trust approach is actualized through continuous monitoring and reporting.

A well-implemented Zero Trust architecture streamlines cybersecurity

All the checking and limiting described above to rule out explicit trust sounds like a huge task. And it is. Fortunately, once the hard work of defining flows and working out access privileges is complete, it is a task that well-implemented systems are designed to seamlessly handle through policy-driven controls. The very best systems leverage machine learning to automate policy creation and updating, reducing error and bias while freeing scarce IT resources for other tasks.

Zero Trust enables hybrid workforces in ways well beyond stronger security

Zero trust solutions streamline and integrate user access to all the assets they need, providing a consistent user experience and applying the same security controls regardless of where users are located and where resources are located.

Zero Trust plays a significant role in revolutionizing how networking’s done

Given the increasingly central role that private clouds, public clouds and SaaS apps play for most businesses, and the normalization of remote work, Zero Trust security is almost universally applied at the cloud edge where resources, data and users interact. Once security is moved to the cloud edge, it is inevitable that networking controls will follow. The integration of cybersecurity and networking functions will result in significant cost savings, as will replacement of costly and inherently less secure MPLS-based WANs.


When working in any field, it is easy – natural, even – to zoom in on the details that matter. But it is also way too easy to lose sight of the larger picture, the big story that is most significant for the world at large. Zero Trust security is a big story that has profound implications for how businesses will operate for years to come. It is up to us, the industry leaders, to keep telling that broader story to the stakeholders of organizations that will benefit most from the coming cybersecurity revolution.

Share this on:

Author Avatar

About David Canellos

A seasoned cybersecurity leader with over two decades of experience heading early-stage, venture-backed startups, mid-sized and large organizations, David was previously Symantec SVP of Global Service Providers business. Earlier, he was President and CEO of Perspecsys Inc., overseeing its acquisition by Blue Coat Systems, which was then acquired by Symantec. David was SVP Worldwide Sales and Marketing at Irdeto division of Naspers, which acquired Cloakware, where he was President and COO.

Recent Posts

Air Gapping Your Way to Cyber Safety

Physically air gapping enterprise networks from the web is a great way to protect operations, keep data safe … and squelch productivity. Virtual air gapping is a better approach.

Motion Picture Association Updates Cybersecurity Best Practices

The MPA recently revised its content security best practices to address, among other challenges, the issue of data protection in the cloud computing age.

FTC Issues Cybersecurity Warning for QR Codes

QR codes on ads are a simple way to grab potential customers before they move on. No wonder cybercriminals are using QR codes, too.