Business Continuity Employee Experience Featured Security

New Forrester Paper Shows How Implementing Solutions With Intrinsic Security is Key to Achieving Zero Trust

Security is a board room discussion today, and for good reason. As an industry, there is ever-growing investment, but breaches are rising in terms of quantity and damage1.  We need a fundamental change in the way we think about security. For far too long, enterprises small and large have relied on network perimeter-based security to protect enterprise data. Growing trends such as increased mobility of the workforce and maturity of cloud technologies have been highlighting the limitations of this security model for a few years now. But the global health crisis has completely exposed gaps in the security infrastructure for enterprises around the world.

A Zero Trust Security Model – that relies on “Never Trust, Always Verify” – is best suited for the new distributed enterprise environment we have today. This security model ensures the necessary security controls are in place to protect enterprise data while enabling a workforce of the future to be productive, irrespective of where they are working from.

As enterprises embark on the Zero Trust journey to secure their IT infrastructure, VMware strongly believes that they also need a new approach to how security is delivered – one that is INTRINSIC from endpoint to the cloud. Intrinsic Security utilizes existing infrastructure to act as sources of data and points of control. It incorporates solutions for workload, network, cloud, identity and endpoints. This approach supports the Zero Trust framework, enabling organizations to follow Zero Trust model most effectively. There are many methods to implement Zero Trust Security, but architecting security intrinsically into the infrastructure gives you comprehensive security with minimal complexity and fastest time to value.

A recent research report – “How to Get from Here To Zero Trust” conducted by Forrester Consulting in partnership with VMware – shows that Intrinsic Security:

• Minimizes the risk of technical failure

• Reduces complexity and costs

• Increase your chances for success by making Zero Trust a collaborative activity.

 You can read more about why Zero Trust delivered with Intrinsic Security is more effective in this report.

Click image to read full report

References

1. Defense evasion – 90% of attacks in 2019 used defense evasion behaviors; Ransomware rise – 60%+ of ransomware attacks are targeting critical infrastructure; Avg. cost of breach: $3.9M; Source: VMware 2020 Cybersecurity Outlook Report, February 2020; Source: https://digitalguardian.com/blog/whats-cost-data-breach-2019

Related Articles