Page 91 - Cyber Defense eMagazine September 2023
P. 91

•  User and Entity Behavior Analytics (UEBA) through a managed process to use machine learning
                   algorithms to analyze user behavior patterns and identify deviations that could indicate malicious
                   activity or insider threats, allowing for early detection and response.
               •  Next-Generation Firewalls (NGFW) applying segmentation and Mini segmentation to go beyond
                   the capabilities of traditional firewalls to provide intrusion prevention, deep packet inspection as
                   required, and application-aware filtering in order to detect and block sophisticated threats and
                   offer more granular control over network communications.
               •  Endpoint Detection and Response (EDR) solutions focus on detecting and responding to threats
                   at the endpoint level, such as workstations, laptops, and servers.
               •  Cloud Security Solutions protect cloud environments and data; solutions include cloud access
                   security  brokers  (CASBs),  cloud  workload  protection  platforms  (CWPPs),  and  cloud-native
                   security tools.
               •  Security Orchestration, Automation, and Response (SOAR) automates and streamlines security
                   operations by integrating various security tools, orchestrating incident response workflows, and
                   automating routine tasks.
               •  DevSecOps is an approach that integrates security practices into the software development and
                   deployment process



            These  are  just  a  few  of  the  approaches  available  to  large-scale  enterprises  for  the  management  of
            cybersecurity threats. A multilayered managed approach that combines various technologies, ownership
            and best practices is ideal — Zero Trust Architecture has risen to prominence as a failsafe safeguard
            from cybersecurity threats.



            What Is Zero Trust Architecture?


            In  response  to  the  evolving  cybersecurity  landscape  and  after  traditional  security  approaches  have
            proven to be insufficient, the U.S. Government has ordered the adoption of ZTA as a more proactive and
            robust  security  model  to  counter  threats.  And  enterprise  corporations,  known  for  their  siloed
            organizational  structures  which  can  inhibit  critical  communication  when  managing  data  across  an
            enterprise network, are quickly jumping on board with this up-and-coming security solution.(4)

            What exactly is Zero Trust Architecture? ZTA is a security framework and approach that challenges the
            traditional perimeter-based security model. It’s based on the simple yet critical principle of "never trust,
            always verify" and assumes that no user or device should be inherently trusted, and all transactions must
            be verified whether they’re located inside or outside the network perimeter.

            The adoption of Zero Trust Architecture (ZTA) is gaining traction across various industries and large-
            scale  enterprise  organizations.  Many  organizations,  including  Fortune  500  companies,  government
            agencies, and financial institutions, have recognized the benefits of ZTA and are actively implementing
            or  considering  its  adoption.  A  2021  survey  conducted  by  Pulse  Secure  found  that  60  percent  of  IT
            decision-makers across organizations of different sizes and sectors were planning to implement Zero
            Trust initiatives.(5)




            Cyber Defense eMagazine – September 2023 Edition                                                                                                                                                                                                          91
            Copyright © 2023, Cyber Defense Magazine. All rights reserved worldwide.
   86   87   88   89   90   91   92   93   94   95   96