Gartner advises all companies

Explore discuss data innovations to drive business efficiency forward.
Post Reply
rakhirhif8963
Posts: 533
Joined: Mon Dec 23, 2024 3:15 am

Gartner advises all companies

Post by rakhirhif8963 »

Attacks are becoming more sophisticated
In a recent survey, HP found that more than three-quarters of businesses are concerned that hackers are using the same tactics used in nation-state attacks. Ian Pratt, global head of personal security at HP, said those concerns are well-founded, as evidence has emerged that hackers have adopted tactics used in the SolarWinds breach, as well as the Eternal Blue exploit used by the WannaCry hackers.

to move to a “zero trust” approach, with secure access and micro-segmentation as key elements.

Following the investigation, Gartner advised companies to phase out VPN protection and replace it with zero trust network access (ZTNA), especially for solutions for employees and partners facing the Internet. The analysts also predict that in 2022, 80% of new digital business applications in ecosystems will be accessible via ZTNA, and in 2023, 60% of jamaica mobile database will phase out VPN in favor of this technology.

Traditional and point solutions simply don't work
The cybersecurity industry is currently in crisis. Point solutions are limited by their fragmented context, and reactive traditional solutions allow attackers to remain undetected for months. Current technologies are not working, and IDC research published this summer proves it: over the past year, more than a third of enterprises have been attacked by ransomware, with financial and manufacturing companies hit hardest.

Zero Trust is a journey, not a product. CIOs need to understand this
One of the challenges the cybersecurity industry has had to face is its reputation. Instead of being concerned with the solution itself and how it will work in a company’s specific network infrastructure, security solutions are viewed as firefighters in case of the occasional hacker attack. At the same time, there are no alternative solutions or tactics for a zero trust infrastructure: once the decision is made to implement it, companies should not look for new solutions, since the fundamental principles of zero trust mean that they are not fighting specific attacks, but rather asking why and how each endpoint is gaining access.
Post Reply