Martin Kuppinger explains the meaning behind the popular buzzword.
KuppingerCole's Advisory stands out due to our regular communication with vendors and key clients, providing us with in-depth insight into the issues and knowledge required to address real-world challenges.
Unlock the power of industry-leading insights and expertise. Gain access to our extensive knowledge base, vibrant community, and tailored analyst sessions—all designed to keep you at the forefront of identity security.
Get instant access to our complete research library.
Access essential knowledge at your fingertips with KuppingerCole's extensive resources. From in-depth reports to concise one-pagers, leverage our complete security library to inform strategy and drive innovation.
Get instant access to our complete research library.
Gain access to comprehensive resources, personalized analyst consultations, and exclusive events – all designed to enhance your decision-making capabilities and industry connections.
Get instant access to our complete research library.
Gain a true partner to drive transformative initiatives. Access comprehensive resources, tailored expert guidance, and networking opportunities.
Get instant access to our complete research library.
Optimize your decision-making process with the most comprehensive and up-to-date market data available.
Compare solution offerings and follow predefined best practices or adapt them to the individual requirements of your company.
Configure your individual requirements to discover the ideal solution for your business.
Meet our team of analysts and advisors who are highly skilled and experienced professionals dedicated to helping you make informed decisions and achieve your goals.
Meet our business team committed to helping you achieve success. We understand that running a business can be challenging, but with the right team in your corner, anything is possible.
Martin Kuppinger explains the meaning behind the popular buzzword.
Martin Kuppinger explains the meaning behind the popular buzzword.
Welcome to my podcast. My name is Martin Ko. There's a lot of talk about zero trust environments in it, and it security these days and there's a logic behind it. So with the experience of work from home, we trust recently had to have, and many organizations, many people had to work from home and still have to work from home.
The, there was apparently a situation where many people also needed to work as a, bring your own device approach, bringing their own use in their own computers, using their own bios at home, accessing resources of corporations. And so there's a logic of this leading towards a far stronger adoption of the zero trust paradigms in security and changing the way we do it at the end of the day in a shift away from traditional on-premise data centers towards using as a service deployment models. Why is this? Because at the end, the easiest way is to think in, we have devices which access a service.
Unfortunately, we can't trust these devices that much we can't trust the networks these devices are in, but that's the reality by the way, not only in work from home scenarios, but also in, in everything mobile user is doing, the mobile user might use might be required to use an insecure network. Yes, we can add an extra layer of protection, etcetera. There might be this, or there are just reality for years right now, this bring your own device scenarios where people use own devices.
So let's reflect this and think in a way where we say, okay, we have device, we need to understand how secure insecurity is. We need to ensure that our information secure help in somewhere where it's accessible, including the service being accessible and then apply the required security measures. Don't trust the device, don't trust the internal network anymore. We can't trust that we have device is accessing services and think in, in a level, in a way where we say, okay, the device not necessarily secure the network, not necessarily secure.
We try to understand how secure it is and then apply appropriate measures of protection to these environments. This is basically the zero trust thinking. Don't trust, verify the trust and apply adequate security measures, but we can do a lot with saying, okay, in fact, we are able to say, this is access from this device. Data always store somewhere in the cloud in as secure, possible location, accessible from everywhere. And then We applied the, the security measures.
We applied a multifactor authentication, adaptive authentication, which varies, varies depending with the, depending on the level of trust. And we built this networks. I think the time really recently has taught us that approaches, which try to go through the internal network, connect everything back, et cetera. They are not flexible enough to deal with specific scenarios we just had or have as well as they're not flexible enough to reflect the reality of work and how work happens these days. So let's really shift us, move to zero trust paradigm. Consequently, thank you for listening to me.