Zero Trust and digital transformation

<span id="hs_cos_wrapper_name" class="hs_cos_wrapper hs_cos_wrapper_meta_field hs_cos_wrapper_type_text" style="" data-hs-cos-general-type="meta_field" data-hs-cos-type="text" >Zero Trust and digital transformation</span>

Zero trust as a new security concept?

Everyone is talking about digitalisation, the digital transformation, a change in working environments and working methods, working from home, "Work Where You Are" and "Bring Your Own Device"...

The effects of this change are manifold and require increased attention with regard to the security of data and transactions on the internet. The digital transformation requires enterprise security and networks to evolve as their users, applications, devices and data are increasingly outside their established local networks and control:

  • According to a Gartner study, 40.8% of companies have 21-40% working off-site
  • More than 67% of workers use their own devices at work, 80% of these BYOD devices are unmanaged.
  • 50% of companies use cloud-based applications
  • Less than 10% of companies report knowing exactly which devices are accessing their network.

Most users, devices, applications and data are now outside of the traditional network transition and therefore outside of an established control zone of a local IT infrastructure that has been proven over many years.

New digital business processes increase the potential attack surface for malware. Data theft and data loss are the consequences.

A Gartner estimate states that more than 20.4 billion IoT devices will be installed in 2020. These are protected with standard passwords that are usually not changed by the owners. A quick meal for malware and ideal starting points for large-scale DDOS attacks.

The consequences that must be drawn from these facts are clear. For most IT companies, it is most likely not possible to establish private internet connections between all employees/users, data centres and cloud service providers hosting the applications.

Nor is it realistic to deploy an application delivery device or virtual appliance in every data centre, cloud environment and end-user location. A private WAN is cost-intensive for companies and also no longer up-to-date. Alternative to VPN: Secure remote access to corporate networks. This means that companies must provide their employees with easy and secure remote access to their networks. Traditional solutions such as virtual private networks (VPNs) are complex, costly and provide a poor end-user experience. They also increase the risk of security breaches.

Protect your networks and data with EAA and ETP

Akamai's Enterprise Application Access (EAA) supports Zero Trust by ensuring authenticated and authorised users have secure access to applications and data. Access is limited to the applications a user needs to do their job. This also means that verification and authorisation decisions need to be made more frequently than in the past. Providing seamless, secure single sign-on for all types of applications – whether on-premises, IaaS or SaaS – can simplify application-specific access control.

Keep attackers out – move security auditing to the cloud with ETP

The volume and frequency of complex targeted threats such as malware, ransomware, data extraction and phishing are increasing exponentially, and for many organisations, effectively protecting against them is a challenge.

Enterprise Threat Protector can detect, block and defend against such threats. It is supported by real-time intelligence from Akamai Cloud Security Intelligence and is based on Akamai's proven globally distributed recursive DNS platform.

So, for example, when your organisation's outbound DNS traffic is redirected to Enterprise Threat Protector, the requested domains are checked using real-time risk assessment and, if necessary, access to malicious domains and services is prevented. Employees are prevented from accessing content that is inappropriate according to their usage policies.

With ETP, you simply move security scanning to the cloud, far away from your corporate network, and you don't have to deal with an attacker when it's already knocking on your firewall or being reported by your local anti-virus programme. In this way, ETP provides your company with efficient security, control and transparency that can be easily integrated into your existing defence mechanisms.

Try Enterprise Threat Protector free of charge:

Info downloads:

Infographic "No digital transformation without Zero Trust"

Detailed description of ETP – Enterprise Threat Protector