Broadcom Software offers one of the world’s leading business-critical software portfolios that modernizes, optimizes, and protects the world’s most complex IT environments. We are investing in technology to enable scalability, agility, and security of the largest global companies in the world.
Broadcom Software Shows Why Zero Trust is Important Everywhere
Zero Trust is fast becoming a must-have for 2022 and beyond.
BrandPosts are written and edited by members of our sponsor community. BrandPosts create an opportunity for an individual sponsor to provide insight and commentary from their point-of-view directly to our audience. The editorial team does not participate in the writing or editing of BrandPosts.
By Andy Nallappan, Chief Technology Officer and Head of Software Business Operations, Broadcom Software
Bad actors are stepping up their attacks, and companies have new problems to solve for.
For example, with nearly half (47%) of business leaders planning to allow employees to work remotely full time in the post-Covid era, more company personnel are using their own or shared devices, sometimes over unsecured networks.
Meanwhile, geopolitical conflicts are threatening to cause spillover effects on corporate networks. A specific example of this was a new form of disk-wiping malware (Trojan.Killdisk) being used to attack organizations in Ukraine shortly before the launch of a Russian invasion on February 24. Symantec, a division of Broadcom Software, also found evidence of wiper attacks against machines in Lithuania, which targeted areas in financial, defense, aviation, and IT services sectors.
And the most recent Verizon security report found that over 80% of breaches involve brute force or the use of lost or stolen credentials.
Perimeter defenses are a relic of the past, and itâs time for CIOs to reexamine dated assumptions — not the least of them being an over-reliance upon VPNs to protect company security. Even before the pandemic forced companies, seemingly overnight, to shift to remote work, the migration of business to the cloud raised new questions about the ability of conventional perimeter-based defenses to protect critical systems and data. Those questions canât be put off any longer.
New Threats Call for New Thinking
When Forrester coined the Zero Trust security model in 2010, they were looking to represent a methodology for how to transact business securely based on the principle of “never trust, always verify.â It was a data-centric model where you donât trust anything going on inside or outside of the perimeter. It meant continuously verifying every user and device and always assuming your organization will be breached.
I can understand why some might be wary of Zero Trust, as it constitutes a very different philosophy of how we should secure our infrastructure, networks, and data. But thereâs a reason why this is the right idea.
The Zero Trust model rests upon one fundamental tenet: donât trust any actor, system, network, or service operating outside or within the security perimeter. Period. That means verify everybody and everything trying to establish access. And it doesnât stop with just verifying once at the perimeter; it also involves continual verification of each user, device, application, and transaction.
Context becomes critical to establishing trust. In some contexts, youâll have very little trust, and in other contexts, more trust â all based on risk-based policies. That means coming up with answers to different questions, such as ones that address the health of the device and its security. For example: Is it on a known network or an unknown one? Is it located in a specific geo-location? What are the governance conditions?
Ultimately, everything boils down to context and determining the level of risk an organization is willing to take. Then it becomes a matter of putting the right controls in place and determining the level of risk as the company decides what to allow, what to block and whatâs required to enable identities to access resources.
The World is `Getting Itâ
Perhaps then itâs unsurprising that in January of this year,
The Office of Management and Budget published a Federal Zero Trust architecture strategy, outlining specific cybersecurity standards and objectives that federal agencies must meet by the end of Fiscal Year (FY) 2024. It also reflects the governmentâs increased sense of urgency about cybersecurity. Last spring the White House announced an executive order to modernize the governmentâs IT infrastructure and bolster its ability to withstand cyberattacks. (You can read more about what it means here.)
Meanwhile, Forrester notes that tââwo-thirds of those agencies plan to increase their investment in Zero Trust technology deployments this year.
But this transition remains uneven. Only a little more than one-third of the organizations surveyed by Forrester have begun the work to deploy a Zero Trust strategy. Just 6% reported having fully deployed their rollout. The encouraging news is that itâs only a matter of time before things change markedly for the better. That same Forrester report found that 68% of organizations intend to increase their Zero Trust investment this year.
So, itâs now a race against time. We know whatâs out there â the so-called âknown unknownsâ â and itâs not good. The question is: How soon we can put a Zero Trust strategy in practice to make sure we can mitigate those threats? The clock is ticking.
Andy is the Chief Technology Officer and Head of Software Business Operations for Broadcom Software. He oversees the DevOps, SaaS Platform & Operations, and Marketing for the software business divisions within Broadcom.