"Since the implementation of the Zero Trust

Telemarketing List offers accurate and up-to-date phone contact lists for businesses. Reach potential clients efficiently and boost your outreach efforts.
Post Reply
tanjimajuha20
Posts: 575
Joined: Thu Jan 02, 2025 7:18 am

"Since the implementation of the Zero Trust

Post by tanjimajuha20 »

In the future, according to Vladislav Krylov, companies will more actively implement automation and machine learning to improve processes within the framework of Zero Trust.

Barriers to ZT implementation include a lack of resources, insufficient awareness of organizations, the presence of outdated systems and technologies, and the need for large-scale changes in infrastructure and security policy, says Valery Stepanov.

concept requires investment, afghanistan whatsapp number database time, and an inevitable deterioration, at least initially, in user experience, it is difficult to justify the benefits and necessity of ZT at the top management level, which is why it has not yet become widespread," says Alexey Korobchenko.

Vitaly Darovskikh believes that the implementation is hampered by the same things that hinder other IT infrastructure changes: lack of coordination between the business, IT department and information security department, the search for opportunities to "save" at the expense of individual elements of the system, etc.

"Implementation of Zero Trust requires significant resources. Firstly, it is necessary to resolve the issue of a severe shortage of personnel on the market - someone needs to implement the concept, and this requires certain competencies. Secondly, the involvement of information security specialists is not enough, because ZT cannot be built without IT - it is important to take into account the time to market and strict requirements from the business. Thirdly, most often each infrastructure is not created from scratch and already has a branched architecture with an extensive legacy, which, naturally, affects the business and cannot be reconfigured quickly," said Alexey Tripkosh, Director of Effective Cybersecurity, Positive Technologies.

Experts also cited the difficulty of integrating ZT with existing systems and processes and employee resistance.

Information security experts believe that the departure of foreign vendors contributes to the development of domestic solutions. Also, the implementation of ZT has become more complicated, since many companies relied on foreign solutions in the field of cybersecurity, according to Svyatoslav Dmitriev. Vitaly Darovskikh believes that in a year or two everything will return to the previous level.

"Foreign information security solutions had a significant advantage - richer functionality compared to domestic products. Therefore, implementing the ZT concept has become a little more difficult, but over the past two years, Russian vendors have significantly improved. It is possible that in the next few years we will see a larger-scale implementation of the ZT concept," says Alexey Korobchenko.

Read also
Post Reply