Page 91 - Cyber Defense eMagazine September 2023
P. 91
• User and Entity Behavior Analytics (UEBA) through a managed process to use machine learning
algorithms to analyze user behavior patterns and identify deviations that could indicate malicious
activity or insider threats, allowing for early detection and response.
• Next-Generation Firewalls (NGFW) applying segmentation and Mini segmentation to go beyond
the capabilities of traditional firewalls to provide intrusion prevention, deep packet inspection as
required, and application-aware filtering in order to detect and block sophisticated threats and
offer more granular control over network communications.
• Endpoint Detection and Response (EDR) solutions focus on detecting and responding to threats
at the endpoint level, such as workstations, laptops, and servers.
• Cloud Security Solutions protect cloud environments and data; solutions include cloud access
security brokers (CASBs), cloud workload protection platforms (CWPPs), and cloud-native
security tools.
• Security Orchestration, Automation, and Response (SOAR) automates and streamlines security
operations by integrating various security tools, orchestrating incident response workflows, and
automating routine tasks.
• DevSecOps is an approach that integrates security practices into the software development and
deployment process
These are just a few of the approaches available to large-scale enterprises for the management of
cybersecurity threats. A multilayered managed approach that combines various technologies, ownership
and best practices is ideal — Zero Trust Architecture has risen to prominence as a failsafe safeguard
from cybersecurity threats.
What Is Zero Trust Architecture?
In response to the evolving cybersecurity landscape and after traditional security approaches have
proven to be insufficient, the U.S. Government has ordered the adoption of ZTA as a more proactive and
robust security model to counter threats. And enterprise corporations, known for their siloed
organizational structures which can inhibit critical communication when managing data across an
enterprise network, are quickly jumping on board with this up-and-coming security solution.(4)
What exactly is Zero Trust Architecture? ZTA is a security framework and approach that challenges the
traditional perimeter-based security model. It’s based on the simple yet critical principle of "never trust,
always verify" and assumes that no user or device should be inherently trusted, and all transactions must
be verified whether they’re located inside or outside the network perimeter.
The adoption of Zero Trust Architecture (ZTA) is gaining traction across various industries and large-
scale enterprise organizations. Many organizations, including Fortune 500 companies, government
agencies, and financial institutions, have recognized the benefits of ZTA and are actively implementing
or considering its adoption. A 2021 survey conducted by Pulse Secure found that 60 percent of IT
decision-makers across organizations of different sizes and sectors were planning to implement Zero
Trust initiatives.(5)
Cyber Defense eMagazine – September 2023 Edition 91
Copyright © 2023, Cyber Defense Magazine. All rights reserved worldwide.