Posted on May 31, 2023
Want to interview Gerry?
Contact
Zero Trust is not a brand-new approach to cybersecurity. Back in 2020, we shared an article about “Ten Years of Zero Trust.” It took a while, but Zero Trust has now definitively caught on as the best approach to protecting digital assets and infrastructure, as well as the organizations that depend on them. In that article, just three years ago, we shared Gartner predictions that no major Infrastructure-as-a-Service provider would offer a Secure Access Service Edge (SASE)/Secure Service Edge (SSE) solution, a comprehensive approach to Zero Trust, before 2025. But the market has been much more agile than they anticipated: SASE/SSE offerings from companies large and small are already here and organizations are snapping them up. In fact, in their 2022 Market Guide for Single-Vendor SASE, Gartner predicts:
Before we delve into the current state of the art in Zero Trust security, we’ll review some of the basics, including the fundamental Zero Trust principles.
Zero Trust cybersecurity is a radically different approach than earlier, perimeter-based approaches. In the old model, the digital world was divided into inside and outside. Those on the inside, on the corporate network, were assumed to be trustworthy. The outside world, the internet, was the dangerous place where threats originated.
The old approach was similar to a castle with a moat. Once you were inside the castle, you could wander around where you wanted. But outsiders were kept out until they were carefully scrutinized and deemed safe. Once they were in, however, they were in.
The old approach protected the perimeter with passwords for users and a firewall supported by detection-based malware and virus detection.
There are several problems with the detection-based perimeter approach to cybersecurity:
Zero Trust security takes a completely different approach. Zero Trust is not a specific technology. Rather, Zero Trust is a set of principles that can be applied via a variety of different implementations. The US National Institute of Standards and Technology’s (NIST) Special Publication, NIST SP-800-207, provides excellent guidance for Zero Trust architecture.
As the name implies, Zero Trust treats every user, every packet, with suspicion. Fundamental Zero Trust principles include:
Many different components may be included in Zero Trust cybersecurity solutions. Some typical components include:
Vendors are continually adding to the arsenal of Zero Trust technologies. While a company can try and piece together a Zero Trust approach to cybersecurity in bits and pieces from multiple vendors, it’s much easier, and generally more effective, to use the state-of-the-art in Zero Trust security: a comprehensive Security Service Edge (SSE) platform such as ZTEdge.
ZTEdge provides all the key elements of a Zero Trust architecture – IAM, Zero Trust Network Access including microsegmentation, RBI, WAI, CASB, secure remote access, secure virtual meetings – in an easy to deploy, cloud-based solution. ZTEdge was designed from the ground up to meet the needs of midsize enterprises in a cost-effective manner. It provides all the protection a company needs without unnecessary complexity.
Air Gapping Your Way to Cyber Safety
Physically air gapping enterprise networks from the web is a great way to protect operations, keep data safe … and squelch productivity. Virtual air gapping is a better approach.
Motion Picture Association Updates Cybersecurity Best Practices
The MPA recently revised its content security best practices to address, among other challenges, the issue of data protection in the cloud computing age.
FTC Issues Cybersecurity Warning for QR Codes
QR codes on ads are a simple way to grab potential customers before they move on. No wonder cybercriminals are using QR codes, too.