• BLOG
  • Security for a zero-trust world

Security for a zero-trust world

September 12, 2018
Build trust in a zero-trust world

This session will be presented at the 2018 Gartner Symposium in Orlando (October 17 @ 1:15PM in Room Southern III of the Dolphin Hotel) and Barcelona (November 5 @ 13:00 in CCIB Room 116).


As network perimeters dissolve, traditional enterprise security models fail. Cloud becomes the back-end. Mobile becomes the front-end.

That is because our business computing requirements follow our consumer preferences. “Consumerization of IT” is no longer a buzzword but rather today’s reality. Mobile delivers the best human experience, and cloud infrastructure powers the modern enterprise engine of innovation and choice.

The central security challenge in this environment is that traditional arbiters of trust, such as firewalls, VPNs, web gateways, and locked-down Windows PCs, are side-stepped. They can’t address this new perimeterless, zero trust world.

In the absence of existing controls, many IT professionals turn to user authentication as the central mechanism of determining who gets access to what and when. But user trust is not enough to protect against either external or insider threats. Users on compromised smartphones, for example, should not have access to privileged data no matter how “trusted” they are.

Over the last twelve months, I’ve seen many IT organizations struggle with this issue until they realize that what they first need, before even thinking of technology, is a new model of trust. I’ve been identifying best practices and, maybe more importantly, common traps IT leaders face as they rethink their underlying security and enablement architecture.

This has culminated in the development of a session called “Security in a Zero-Trust World” that I will be presenting at this year’s Gartner Symposium in Orlando, Florida (October 17 @ 1:15PM in Room Southern III of the Dolphin Hotel) and Barcelona, Spain (November 5 @ 13:00 in CCIB Room 116).  The session will outline an architecture and trust model to bring together identity, endpoint security, and cloud security in a practical way so that you can tap into mobile and cloud innovation without sacrificing business integrity. You can find the full agenda here for Orlando and here for Barcelona.

I hope to see you there!
 
Safe travels.

Ojas Rege

Ojas Rege, Chief Marketing and Strategy Officer at MobileIron

About the author

twitter icon

 

 

Ojas Rege's perspective on enterprise mobility has been covered by Bloomberg, CIO Magazine, Financial Times, Forbes, and Reuters. He coined the term “Mobile First” on TechCrunch in 2007, one week after the launch of the first iPhone, to represent a new model of personal and business computing. He is co-inventor on six mobility patents, including the enterprise app store and BYOD privacy. Ojas is also a Fellow of the Ponemon Institute for information security policy. Ojas has a BS/MS in Computer Engineering from M.I.T. and an MBA from Stanford. Ojas is also Board Chair for Pact, a non-profit in Oakland, California that provides adoption services for children of color and their parents.