The Data-Centric Approach to Zero Trust

20 Apr 2021 01:02 PM

Guest blog: Deepak Mishra, Wipro. Zero Trust – There are many journeys to Zero-Trust and many different ways to approach it. Why did your company move to Zero-Trust? How does your technology help people migrate to a Zero-Trust system? How do you intend to continue your journey to a Zero-Trust system?

With the growth of remote access (particularly during the COVID-19 pandemic), the proliferation of SaaS applications, Shadow IT, migration towards cloud-based infrastructure, and adoption of bring your own device (BYOD), there is no longer a clearly-defined network boundary to defend and our company users expect to access their information from any location, on any device. With Sophisticated cyberattacks, it is now virtually impossible to protect the network, and hence the data with this approach. A completely new approach is needed to solve the problem that is Zero Trust (Do not Trust, Always Verify).

Discussion Points 

  1.  Different Journey options for  Zero-Trust
  2. How does Technology helps for Zero- Trust Transition and migration
  3. How to continue on the Journey to achieve Zero-Trust target state 

There are many journeys to Zero-Trust and many different ways to approach it 

There are a few competing approaches to implementing a zero trust architecture but the 3 most widely approach to accomplish a Zero Trust Security Model is,

Zero trust alone says much less about how organizations should think about data that’s inside their segmented, access-controlled environments. 

 How does your technology help people migrate to a Zero-Trust system?  

To gain full control over its sensitive data and get maximum value from its investment in zero-trust architecture, my organization has adopted a data-centric security approach to technology intervention during the implementation 

How do you intend to continue your journey to a Zero-Trust system?

The Data-Centric Approach 

Deepak Mishra is Wipro’s Global Head for Data Security Governance with 19+ years of varied experience in cybersecurity