Express Computer
Home  »  News  »  Zero trust: The only protection model for businesses in the new normal

Zero trust: The only protection model for businesses in the new normal

0 118

 Akamai, the solution to power and protect digital company, has shared how the Zero Trust model is the present and future of online security, delivering significant business value in addition to being a first line of defense against cybercriminals.

The insights come on the back of the recently concluded Akamai Zero Trust Journey Roundtable series in India. During the event, Akamai shared how important it is for organisations to adopt a Zero Trust network architecture to protect enterprise data, wherever users and devices are, whilst also ensuring that applications work quickly and seamlessly without any downtime. This is particularly important as Covid-19 work from home policies have resulted in employees using more personal devices.

Siddharth Pisharoti, RVP, India and SEA region, Akamai said, “At Akamai, we regularly observe enterprises suffering from cyberattacks that could have easily been thwarted using a Zero Trust approach. While it may sound scary or difficult to implement, Zero Trust is truly more than a defensive strategy, and can bring many business benefits, helping modernise cybersecurity and provide business and IT leaders the peace-of-mind they need.”

Amid the Covid-19 pandemic, cybersecurity incidents continue to rise globally. As the world’s largest and most distributed edge platform, Akamai analyses over 300 terabytes of new attack data per day. Through this analysis, Akamai has noted record-breaking highs in attack vectors such as:

  • Distributed-Denial-of-Service (DDoS) attacks: Akamai mitigated 1900+ DDos attacks in Q1 2021, marking a 34 per cent year-on-year increase
  • Credential abuse: 63 billion credential abuse attacks were identified in Q1 2021, a whopping 133 per cent increase
  • Application layer attacks: Over two billion Web Access Firewall (WAF) alerts were triggered in Q1 2021, a 70 per cent year-on-year jump

In light of these startling numbers, Akamai’s CEO, Tom Leighton urged businesses to move away from traditional perimeter defense strategies and protect internal apps the same way they protect external facing apps — as if there was no perimeter.

Zero Trust is a network security model, based on a strict identity verification process, using the principle of least privilege. The framework dictates that only authenticated and authorised users and devices can access applications and data, ensuring that applications are never exposed. At the same time, it protects those applications and users from advanced threats on the Internet.

At Akamai’s APJ Zero Trust Journey Roundtable series, the company’s CIO, Mani Sundaram shared more about the business’ adoption of this path-breaking security approach and why all organisations should be on the same journey. He also underscored how Zero Trust is more than a line of defense, but instead can benefit businesses by reducing IT complexity, providing greater network visibility, reducing the IT security workload, improving data protection and most importantly, improving user experience.

Get real time updates directly on you device, subscribe now.

Leave A Reply

Your email address will not be published.

LIVE Webinar

Digitize your HR practice with extensions to success factors

Join us for a virtual meeting on how organizations can use these extensions to not just provide a better experience to its’ employees, but also to significantly improve the efficiency of the HR processes
REGISTER NOW 

Stay updated with News, Trending Stories & Conferences with Express Computer
Follow us on Linkedin
India's Leading e-Governance Summit is here!!! Attend and Know more.
Register Now!
close-image
Attend Webinar & Enhance Your Organisation's Digital Experience.
Register Now
close-image
Enable A Truly Seamless & Secure Workplace.
Register Now
close-image
Attend Inida's Largest BFSI Technology Conclave!
Register Now
close-image
Know how to protect your company in digital era.
Register Now
close-image
Protect Your Critical Assets From Well-Organized Hackers
Register Now
close-image
Find Solutions to Maintain Productivity
Register Now
close-image
Live Webinar : Improve customer experience with Voice Bots
Register Now
close-image
Live Event: Technology Day- Kerala, E- Governance Champions Awards
Register Now
close-image
Virtual Conference : Learn to Automate complex Business Processes
Register Now
close-image