Page 11 - InfoSec Big Bets 2022
P. 11

In the following piece, he sheds
     light on some of the crucial
     aspects of information security.         (ZTNA),  outlines  a  method  for    A  "zero  trust"  approach  to  IT
     Continue reading to find                  designing  and  putting  IT          security  implies  that  risks  exist
     out more.
                                              systems into place. "Never trust,    inside and outside a network. As
     Key  Technologies  Defining  the          always  verify"  is  the  guiding    a result, Zero Trust strictly verifies
     Info Sec Landscape
                                              principle  of  the  zero  trust      each  user  and  device  before
     T h e   k e y   t e c h n o l o g i e s   o f   security  model,  which  states   granting  access  to  internal
     Information  security  are  as
     follows :                                that  devices  shouldn't  be         resources.
                                              trusted by default, even if they
       Access Control & Detection                                                  Security Training for the
                                              a r e   c o n n e c t e d   t o   a   New Generation
       Antivirus & Antispam and Encryption    permissions  network  like  a
       Firewalls                                                                   T h e   n e x t   g e n e r a t i o n   o f
                                              corporate LAN, and even if they
       IPS & IDS                                                                   cybersecurity experts recognizes
       Internet Security                      have already been confirmed.          the  value  of  training  and
       MFA                                    XDR-In  addition  to  apps  and      certifications  that  keep  them
       Network Security                                                            abreast  of  new  security  breach
                                              endpoints,  networks  and
       PIM/PAM, SIEM                                                               techniques.
                                              clouds  are  also  included  in
     Trends  Visible  in  the  Info  Sec                                           The Changing Role of the
     Space                                    Enhanced  Detection  and             Distributors
     The  globe  is  eagerly  awaiting        Response (XDR), a collection of      Distributors  play  an  important
     many trends. However, the most           tools  and  data  that  offers       role as they keep identifying new
     recent  information  security            extended  visibility,  analysis,
     trends  in  the  current  security       a n d   r e s p o n s e .   E n d p o i n t   technology  vendors  in  the
     market include:                                                               market  and  feeding  us  more
                                              detection  and  response  (EDR)      information about the same.
       SASE-SASE,  or  secure  access         security  has  progressed  to  a     InfoSec Big Bets for 2022
       service edge, is a new idea in         m o r e   a d v a n c e d   a n d    and Beyond

       cybersecurity.  Network  and           sophisticated level with XDR.
       s e c u r i t y - a s - a - s e r v i c e                                     In  the  past  three  to  four
       activities  are  combined  into      Info Security Initiatives                years,  we  have  focused  on

       one  cloud  service  under  the      Zero Trust Network Security is the       SD-WAN, PIM/PAM, and XDR,
       SASE cloud architecture model.       most  important  Information             in  addition  to  applications
       Thanks  to  SASE,  organizations     S e c u r i t y   i n i t i a t i v e   f o r   and network firewalls.
       can integrate their network and      organizations to implement over

       security solutions into a single     t h e   n e x t   fi v e   y e a r s .   T h e   Cloud security will be our main
       management panel.                    technology  that  enables  the           priority for the next three to four
                                                                                     years.
       ZTNA-The  zero  trust  security      implementation  of  a  Zero  Trust
       model also referred to as zero       security paradigm is called Zero
       trust  architecture  (ZNA),  zero    Trust Network Access (ZTNA).
       trust  network  architecture,  or
       zero trust network access -


                                                                                                                 August 2022
   6   7   8   9   10   11   12   13   14   15   16