Today's IT landscape is more complex than ever. The traditional secure perimeter of the network has effectively evaporated and trends such as BYOD, IOT and the gig economy means that unmanaged devices have to be given a measure of limited trust in terms of accessing critical application resources and services.
But with the cacophony of security offerings, how do you actually approach the security of your application ecosystem in 2021 and beyond. Enter Zero Trust, a model that involves assuming every entity attempting to connect to your environment is a potential threat actor, instrumenting granular access control, application-level micro-segmentation, and a least privileged access model.... Sounds complicated - where do you start, how do you begin adopting these principles, and what are the options...
Barry Gleeson I Jason Dover I Kurt Yung