Intelligent CIO LATAM Issue 09 | Page 35

EDITOR ’ S QUESTION

I

will start by talking about the times we are facing . Today , more than a small group of employees are operating in the work-from-anywhere space . Sometimes an entire company is working remotely because employees prefer working at home or choosing different spaces to work .
For a company it is always important to take care of its assets , which is why , regardless of where an employee connects , data and information must always be protected . That is why it must be understood that it is impossible to control the connection points of workers in this new era , much less restrict or inhibit their access points .
I do not want to miss the opportunity to clarify that Zero Trust is not a market product but a cybersecurity model that has gained a lot of strength , precisely because of the new reality of remote work and with which it fits perfectly . So , why has the Zero Trust model become so relevant today ?
First of all , we no longer have the zone of trust that existed in the old security model , where everything behind the firewall was trusted ; now the focus is on resources , users and assets but all seen individually .
Zero Trust assumes that there is no implicit trust in assets or user accounts based only on their location within the network or in ownership of the asset . And in this way , the authentication and authorization of both the user and the device are required functions that are performed before establishing a connection to a corporate resource . must implement a strategy aligned to this requirement and this strategy is called Zero Trust .
This aims to integrate the different parts of a company , from the user , the device , cloud resources , on-prem infrastructure resources , applications , business processes , traffic flows , among other things , to maintain an integrated security .
Zero Trust assumes that there is no implicit trust in assets or user accounts based only on their location within the network or in ownership of the asset .
Finally , I would like to share my experience with many CISOs in the region , who share a starting point to implement this strategy in their companies . This starting point is to have visibility which allows them to know what happens between resources when any type of incident happens and what resources are involved , since we cannot assure something that we do not see . It is the most logical starting point and one that has been very successful in several companies in the region . p
All things considered , if companies want to maintain their dynamism and flexibility in their business , they must adapt to employee mobility and , therefore , they
IGNACIO TRIANA , SALES ENGINEER FOR MULTI-COUNTRY AREA ,
TREND MICRO
www . intelligentcio . com INTELLIGENTCIO LATAM 35