comparemela.com

SYDNEY, Aug. 5, 2022 /PRNewswire/ -- Zero Trust has become a well-recognised framework in the cybersecurity world. SecOps teams are championing this 'trust no-one' strategy to support the fight against the escalating risk of cybercrime, and in helping to monitor threat actors across their network. In fact, research from Gigamon found that 70% of IT leaders agree that Zero Trust would enhance their IT strategy. In short, this approach to cybersecurity eradicates the implicit trust often given to internal traffic within a network. This security-first mindset also benefits business efficiency; 87% of IT teams believe productivity has increased since the start of their Zero Trust journey, as systems run faster and downtime is reduced due to fewer breaches. However, the threatscape is evolving. Ransomware now represents one of the biggest threats to businesses across the world and many are falling victim to catastrophic attacks. This type of malware surged by 82% in 2021 and it shows no signs of stopping, especially as 82% of British firms which have been victims of ransomware attacks reportedly paid the hackers to get back their data. So, can Zero Trust Architecture (ZTA) help organisations protect themselves from one of the biggest threats in today's cyber landscape? What does Zero Trust mean today? When putting trust into something, we should always have a rational reason for doing so. However, this has not always been the case in IT. Instead, for years IT teams have used approximations for trustability, often because mechanisms to support trust-measurement were not practical in the past. This could be because an organisation owns a system, if a user is an employee or if the network has previously been secure. Yet these are not actual trustability measurements, they are instead gross approximations often based on assumptions. When that trust assumption fails, risk is introduced.And when a threat actor recognises those assumptions are part of an organisation's security strategy, they can use them to evade network controls and cause problems for cybersecurity. Zero trust changes this. It dynamically measures whether something is trustworthy by analysing how it works and assessing whether an organisation has a rational basis for trusting it and allowing the connection.This is not only the case for entire systems, but also for individual devices, security mechanisms and users. Given the prominence of BYOD policies and remote working, it is essential that trust is earned rather than given freely, and all users should be considered threats until proven otherwise. In a world where the workforce has shifted significantly to a "work anywhere, work anytime" model, embracing a ZTA simply makes sense. By introducing micro-segmentation - which separates data, assets and applications and represents a key pillar to ZTA - organisations can stop one compromised device becoming an entirely disrupted network. One famous instance is the Las Vegas casino that was hacked through its IoT thermometer in an aquarium in the foyer. From here, the attacker was able to access the casino's entire network. How can businesses protect themselves from this level of threat? With IoT expanding, and adversaries clearly using more innovative tactics and techniques to breach a system, Zero Trust has to be part of the security strategy. Ransomware and deep observability The cornerstone of ZTA is visibility. A clear view across all data in motion - from the cloud to the core - means IT teams can best understand any threat to their network. From here they can authorise safe activity, as well as detect undesirable application behaviour and analyse the metadata that will detail the origin and movement of an attack. In other words, you cannot protect against what you cannot see. The deeper the level of observability into a network, the more insight an IT team can gather and then action to improve their entire security posture. This is actually explicitly required by NIST SP 800-207, the gold standard of zero trust. The very nature of ZTA is deep and thorough inspection of all users and all data, including encrypted traffic. With this architecture and micro-segmentation in place, it will also stop cybercriminals moving laterally within a network - meaning adversaries looking to traverse an IT infrastructure and deploy ransomware across more critical data will be unable to do so. Over recent years, cybercriminals have become far more savvy and sophisticated in how they deploy this kind of malware. An attack in today's climate will typically be carefully considered and strategically targeted against known vulnerable organisations that store critical data. It is also common for bad actors to penetrate a network and lay dormant for months at a time. Visibility is central in the fight against ransomware; by eradicating blind-spots across the network, adversaries will no longer be able to exist on a network undetected. With Zero Trust and deeper observability into all data, criminal dwell time can be cut dramatically from the current average of 285 days. It's important to remember that Zero Trust is not the singular silver bullet to ransomware protection. However, paired with visibility, it will be essential for bolstering a company's cyber posture. By prioritising deep observability, ZTA becomes far easier to introduce and ransomware threats will become far easier to detect. About Gigamon Gigamon offers a deep observability pipeline that harnesses actionable network-level intelligence to amplify the power of observability tools. This powerful combination enables IT organizations to assure security and compliance governance, speed root-cause analysis of performance bottlenecks, and lower operational overhead associated with managing hybrid and multi-cloud IT infrastructures. The result: modern enterprises realize the full transformational promise of the cloud. Gigamon serves more than 4,000 customers worldwide, including over 80 percent of Fortune 100 enterprises, nine of the 10 largest mobile network providers, and hundreds of governments and educational organizations worldwide. For the full story on how Gigamon can help you to realize the power of deep observability, please visit https://www.gigamon.com/and follow us on Twitterand LinkedIn. SOURCE Gigamon

Related Keywords

United Kingdom ,Sydney ,New South Wales ,Australia ,British ,Las Vegas ,Prnewswire Zero , ,Zero Trust ,Zero Trust Architecture ,With Iot ,Aug 5 ,022 Prnewswire Zero Trust Has Becomea Well Recognised Framework In The Cybersecurity World Secops Teams Are Championing This 39 No One Strategy To Support Fight Against Escalating Risk Of Cybercrime ,Nd In Helping To Monitor Threat Actors Across Their Network Fact ,Esearch From Gigamon Found That 70 Of It Leaders Agree Zero Trust Would Enhance Their Strategy In Short ,His Approach To Cybersecurity Eradicates The Implicit Trust Often Given Internal Traffic Withina Network This Security First Mindset Also Benefits Business Efficiency 87 Of It Teams Believe Productivity Has Increased Since Start Their Zero Journey ,S Systems Run Faster And Downtime Is Reduced Due To Fewer Breaches However ,He Threatscape Is Evolving Ransomware Now Represents One Of The Biggest Threats To Businesses Across World And Many Are Falling Victim Catastrophic Attacks This Type Malware Surged By 82 In 2021 It Shows No Signs Stopping ,Specially As 82 Of British Firms Which Have Been Victims Ransomware Attacks Reportedly Paid The Hackers To Get Back Their Data So ,An Zero Trust Architecture Zta Help Organisations Protect Themselves From One Of The Biggest Threats In Today 39s Cyber Landscape What Does Mean When Putting Into Something ,E Should Always Havea Rational Reason For Doing So However ,His Has Not Always Been The Case In It Instead ,Or Years It Teams Have Used Approximations For Trustability ,Ften Because Mechanisms To Support Trust Measurement Were Not Practical In The Past This Could Be An Organisation Ownsa System ,Fa User Is An Employee Or If The Network Has Previously Been Secure Yet These Are Not Actual Trustability Measurements ,Hey Are Instead Gross Approximations Often Based On Assumptions When That Trust Assumption Fails ,Isk Is Introduced And Whena Threat Actor Recognises Those Assumptions Are Part Of An Organisation 39s Security Strategy ,Hey Can Use Them To Evade Network Controls And Cause Problems For Cybersecurity Zero Trust Changes This It Dynamically Measures Whether Something Is Trustworthy By Analysing How Works Assessing An Organisation Hasa Rational Basis Trusting Allowing The Connection Not Only Case Entire Systems ,Ut Also For Individual Devices ,Ecurity Mechanisms And Users Given The Prominence Of Byod Policies Remote Working ,T Is Essential That Trust Earned Rather Than Given Freely ,Nd All Users Should Be Considered Threats Until Proven Otherwise Ina World Where The Workforce Has Shifted Significantly Toa Quot Work Anywhere ,Ork Anytime Quot Model ,Mbracinga Zta Simply Makes Sense By Introducing Micro Segmentation Which Separates Data ,Ssets And Applications Representsa Key Pillar To Zta Organisations Can Stop One Compromised Device Becoming An Entirely Disrupted Network Famous Instance Is The Las Vegas Casino That Was Hacked Through Its Iot Thermometer In Aquarium Foyer From Here ,He Attacker Was Able To Access The Casino 39s Entire Network How Can Businesses Protect Themselves From This Level Of Threat With Iot Expanding ,Nd Adversaries Clearly Using More Innovative Tactics And Techniques To Breacha System ,Ero Trust Has To Be Part Of The Security Strategy Ransomware And Deep Observability Cornerstone Zta Is Visibilitya Clear View Across All Data In Motion From Cloud Core Means It Teams Can Best Understand Any Threat Their Network Here They Authorise Safe Activity ,S Well As Detect Undesirable Application Behaviour And Analyse The Metadata That Will Detail Origin Movement Of An Attack In Other Words ,Ou Cannot Protect Against What You See The Deeper Level Of Observability Intoa Network ,He More Insight An It Team Can Gather And Then Action To Improve Their Entire Security Posture This Is Actually Explicitly Required By Nist Sp 800 207 ,He Gold Standard Of Zero Trust The Very Nature Zta Is Deep And Thorough Inspection All Users Data ,Ncluding Encrypted Traffic With This Architecture And Micro Segmentation In Place ,T Will Also Stop Cybercriminals Moving Laterally Withina Network Meaning Adversaries Looking To Traverse An It Infrastructure And Deploy Ransomware Across More Critical Data Be Unable Do So Over Recent Years ,Ybercriminals Have Become Far More Savvy And Sophisticated In How They Deploy This Kind Of Malware An Attack Today 39s Climate Will Typically Be Carefully Considered Strategically Targeted Against Known Vulnerable Organisations That Store Critical Data It Is Also Common For Bad Actors To Penetratea Network Lay Dormant Months Ata Time Visibility Central The Fight Ransomware By Eradicating Blind Spots Across ,Dversaries Will No Longer Be Able To Exist Ona Network Undetected With Zero Trust And Deeper Observability Into All Data ,Riminal Dwell Time Can Be Cut Dramatically From The Current Average Of 285 Days It 39s Important To Remember That Zero Trust Is Not Singular Silver Bullet Ransomware Protection However ,Aired With Visibility ,T Will Be Essential For Bolsteringa Company 39s Cyber Posture By Prioritising Deep Observability ,Ta Becomes Far Easier To Introduce And Ransomware Threats Will Become Detect About Gigamon Offersa Deep Observability Pipeline That Harnesses Actionable Network Level Intelligence Amplify The Power Of Tools This Powerful Combination Enables It Organizations Assure Security Compliance Governance ,Peed Root Cause Analysis Of Performance Bottlenecks ,Nd Lower Operational Overhead Associated With Managing Hybrid And Multi Cloud It Infrastructures The Result Modern Enterprises Realize Full Transformational Promise Of Gigamon Serves More Than 4 ,000 Customers Worldwide ,Ncluding Over 80 Percent Of Fortune 100 Enterprises ,Ine Of The 10 Largest Mobile Network Providers ,Nd Hundreds Of Governments And Educational Organizations Worldwide For The Full Story On How Gigamon Can Help You To Realize Power Deep Observability ,Lease Visit Https Www Gigamon Com And Follow Us On Twitterand Linkedin Source ,

© 2025 Vimarsana

comparemela.com © 2020. All Rights Reserved.