security and risk management trends
The COVID-19 has made the daily lives of companies turned inside out. The pandemic accelerated the modernization of information technology, driving companies to go through Digital Transformation.
Most of the workforce that previously worked in an office shifted en masse to work from home. This reflected an increase accelerated device accesses ing confidential company information in the cloud from home offices.
This new reality has caused companies to face the following trends that will influence the corporate day-to-day in 2021 and the coming years.
Check out the security and risk management trends according to Gartner :
Trend # 1: Cybersecurity Mesh
“ With many IT assets now outside traditional corporate perimeters, IT leaders must rethink security. ” This modern protection approach aims precisely to implement controls at the points where management is most needed.
Through it, it is possible to perform basic security services, in addition to more advanced centralized policy management and orchestration.
Trend # 2: Security focused on identity ( I dentity-First Security )
This trend implies placing the Identity as the new security perimeter. The companies needed to review the unrestricted access that users previously had, being able to access corporate data at any time and place.
The identity as the new perimeter becomes the center of the safety design, exif going a major shift in priorities protection of thought of traditional LAN edge design.
The goal of subnetting is to create a fast, efficient, and resilient computer network. As networks become larger and more complex, the traffic traveling through them needs more efficient routes.
Trend # 3: Security support for remote work is here to stay
"According to Gartner's CIO 2021 Survey , on average 64% of employees are able to work from home, and two-fifths are actually working from home." Therefore, the trend of security support for home office is here to stay.
For this reason, organizations are accelerating their migration to more modern security infrastructures . For many of them, this migration requires a full reinitialization of policies and tools suitable for a modern remote workspace. It is necessary to create use cases that define who the user is, what type of device they have, what applications and data content they need to access and where in the world they are located.
Comments
Post a Comment