Zero Trust Maturity Model (1) - PowerPoint PPT Presentation

About This Presentation
Title:

Zero Trust Maturity Model (1)

Description:

Akamai’s zero trust network security model is itself a strategy, so too is its deployment. The best approach to reaching a zero trust maturity model would be to start with a single use case, or vulnerable user group, for validation of the network security model. – PowerPoint PPT presentation

Number of Views:0
Slides: 10
Provided by: CDNAllThings
Category:
Tags:

less

Transcript and Presenter's Notes

Title: Zero Trust Maturity Model (1)


1
Zero Trust Network Security and Maturity Model to
Protect Enterprise Data, Wherever Users and
Devices are
2
  • Zero trust security has become the need of the
    hour as users, devices, applications and data are
    moving outside of the enterprise perimeter and
    zone of control, away from the traditional data
    centers. Trust and verify is no longer an
    option, as targeted advanced threats are moving
    inside the corporate perimeter.
  • A zero trust network security model is based on
    the philosophy that no person or device inside or
    outside of an organization should be granted
    access to connect to IT systems or services until
    authenticated and continuously verified. Akamais
    zero trust network security model relies on
    strong authentication and authorization for every
    device and person before any access or data
    transfer takes place on a private network, no
    matter if they are inside or outside that network
    perimeter.

3
A zero trust network access security model relies
on the below principles
  • Every user on a network is always assumed to be
    hostile
  • External and internal threats exist on the
    network at all times
  • Network security is not sufficient for deciding
    trust in a network
  • Every device, user and network flow is
    authenticated and authorized
  • Network security model policies must be
    calculated from as many sources of data as
    possible

4
Proactively identifying, blocking and mitigating
targeted threats
  • A zero trust network security model by Akamai
    ensures network trust and thwarts malicious
    attacks. IT teams need to proactively identify,
    block, and mitigate targeted threats such as
    malware and ransomware, and advanced zero-day
    attacks for users. Zero trust network security
    model can improve security postures while
    reducing the risk of malware.
  • Akamais zero trust network security model is
    itself a strategy, so too is its deployment. The
    best approach to reaching a zero trust maturity
    model would be to start with a single use case,
    or vulnerable user group, for validation of the
    network security model.

5
Implementing a Zero Trust Access Model
6
  • Implementing a Zero Trust Access Model should be
    a core component of an organizations security
    transformation. Using multiple clouds for
    corporate applications be it private, public or
    hybrid, can reduce costs, enable flexibility, and
    accelerate digital transformation. But a
    multi-cloud reality also creates complexity and a
    lack of visibility, exposing an organization to
    risks. Third-party contractors, partners and
    remote workers, all benefit, and even accelerate
    a business.
  • Akamais edge-delivered, identity-aware access
    can tackle a variety of use cases, like
    eliminating the traditional VPNs (Virtual Private
    Networks) that open a business to risks, and
    empower it to deliver applications to users
    whenever and wherever they need it, safely and
    securely.

7
Ensuring that applications work quickly and
seamlessly
  • While considering a security architecture
    transformation, a business should benchmark its
    starting position to identify areas of wins and
    measure zero trust maturity model as it evolves.
    With a zero trust maturity model, an organization
    would have application-layer access and defenses,
    network infrastructure isolation, internet
    traffic visibility, and threat detection. To be
    competitive, businesses need Zero Trust network
    architecture to protect enterprise data, wherever
    users and devices are, while ensuring that
    applications work quickly and seamlessly.

8
About Akamai
  • Akamai is one of the few vendors that has not
    only embraced zero trust network security model,
    but is also deeply engaged in its own zero trust
    maturity model. Akamais cloud security services
    can be combined to build a complete Zero Trust
    solution that best suit an organizations
    specific business needs. Akamai offers the
    worlds most distributed compute platform, from
    cloud to edge, that makes it easy for businesses
    to develop and run applications. Akamais suite
    of leading security, compute and delivery
    solutions have helped global companies to make
    life better for the customers and users.

9
THANK YOU
Australia - North Sydney Sales contact 61-290089
630 76 Berry St Level 7 North Sydney 2060
Write a Comment
User Comments (0)
About PowerShow.com