Skip to main content

Zero Trust for the hybrid workforce

Sep

03

2021

Time to read

Read so far

Written by: 

Jenn Markey

Time to read

Written by: 

African,Guy,Sits,Leaned,On,Couch,Cross-legged,On,Carpet,Near

With a limited global vaccine supply and emerging variants, it’s clear we’re headed for a new normal vs. a return to normal. From a work perspective, that means the hybrid workforce is here to stay. Also referred to as the distributed or remote workforce, this shift completely obsoletes the network security perimeter concept, introducing new risks and vulnerabilities. Plus, we’re still using a lot of those temporary security measures that got implemented at the outset of lockdown orders. Well, with an intensifying threat landscape marked by regular data breaches and ransomware attacks now is the time to clean up all that ‘bubblegum and duct tape’.

As we rethink our approach to the workplace and workforce security, it is imperative to embrace a Zero Trust framework. Assume the network is hostile with external and internal threats in existence at all times. Network locality is not sufficient for trust and every device, user and network flow needs to be authenticated and authorized with the concept of least privileged access.

Zero Trust also highlights the importance of intelligent identity – user or machine – as the foundation for modern IT security. From malware detection to behavioral biometrics and analytics to device and network profiling, intelligent identities provide the contextual awareness needed to determine if access should be granted, blocked or challenged.

Watch our webinar to learn more about cloud-based identities for the new era of work with our Entrust Identity as a Service IAM solution.

jenn-markey-headshot
Jenn Markey
Advisor, Entrust Cybersecurity Institute
Jenn Markey is a content advisor and thought leader with the Entrust Cybersecurity Institute. Her previous roles with Entrust include VP Product Marketing for the Payments and Identity portfolio and Director Product Marketing for the company’s Identity and Access Management (IAM) business. Jenn brings 25+ years of high tech product management, business development, and marketing experience to the Entrust Cybersecurity Institute with significant expertise in content development and curation.
View all of Jenn's Posts
Facebook