Page 232 - Cyber Defense eMagazine Special RSA Conference Annual Edition for 2022
P. 232
In the current scenario, Zero Trust is the most comprehensive approach to complement the perimeter-
based security architecture. The key principle of Zero Trust is based on the concept that no user, device
or application/services will be trusted by default, irrespective of its location. This technology is expected
to have widespread adoption in the current year as it accommodates the security principles required to
combat the increasing number of sophisticated attacks. All network-related entities must be contextually
authenticated on a continual basis to ensure that all diversions in their behavioral patterns are spotted
before a breach happens. Zero Trust fulfills the demands of a unified remote working experience through
hyper-converged technology and infrastructure. Looking past a pandemic-forced remote work towards a
hybrid workplace, the "built-in security" Zero Trust is a must-have project in 2022.
About the Author
Debanjali Ghosh, a technical evangelist at ManageEngine,
helps IT leaders and global enterprises to take on the
evolving cybersecurity challenges. She is a sought speaker
on the key IAM and cybersecurity trends in international
platforms. Her research studies on the topics of Zero Trust,
advanced authentication, and building an enterprise-grade
cybersecurity framework have received much acclaim
internationally. Her insight and advice on leveraging the
latest technology for better IAM and cybersecurity have
helped many Fortune 500 companies.
Debanjali can be reached online at
([email protected],etc..) and at our company
website (www.manageengine.com)
232