Get a Demo Menu

Data Privacy Day 2022: keeping data secure in the organisation

One increasingly prominent notion that’s making waves among security personnel is that of a ‘zero trust‘ model. Based on the principle “never trust, always verify”, zero trust refers to devices that are trying to access the network — all devices must be authenticated, authorised and validated for configuration and posture. This is a key tool for many companies in the face of rising ransomware attacks.

“As if one pandemic was not enough, it seems that a second has surfaced at the same time: ransomware,” said Aron Brand, CTO of CTERA.

“In 2021, traditional enterprise security was seriously challenged, and traditional security solutions have proven to be inadequate for the new distributed working models.

“A zero trust approach, which follows the principle “never trust, always verify”, must be considered a standard part of today’s IT infrastructure. In a zero trust infrastructure, each attempt to access the network, whether or not the device is already on the VPN or LAN, must first be verified before being granted access.

Read more …

Skip to content