Promoted | A software-defined perimeter enables the most comprehensive zero-trust strategy, writes CYBER1 Solutions' MD Jayson O'Reilly
Historically, the perimeter was the main focus of cybersecurity. It utilised a range of tools such as firewalls, intrusion detection and prevention systems, and other network security technologies that acted as sentinels at the gate, enforcing a castle-and-moat approach that ensured that all bad actors and traffic were kept out.
In this way, every time a user requests access they are verified, even if they were authenticated a few minutes before. No access to network resources is granted by default, and access is only granted on the principles of least privilege, ensuring that users access only what they strictly need to do their jobs.
This approach controls access to resources based on identity and forms a virtual boundary around all resources that are networked. By building a perimeter through software instead of hardware, an SDP can obscure an entity’s infrastructure from malicious outsiders, irrespective of where it is located.
SDP also provides a granular level of access control, meaning that access is only granted on a strictly need-to-know basis. Again, this reduces the attack surface and minimises the risk of a security breach. With SDP, real-time visibility into network activity is gained, which enables security teams to detect and respond to security incidents quickly.Finally, SDP also offers a high level of scalability and flexibility.
South Africa Latest News, South Africa Headlines
Similar News:You can also read news stories similar to this one that we have collected from other news sources.
Jagersfontein Dam collapse: Affected residents look to Mashatile for solutionsThe Jagersfontein dam collapse in the Free States claimed one life, saw two more displaced while 186 people were displaced following the disaster.
Read more »
READER LETTER | Compromised Vavi is last person to offer solutionsREADER LETTER | Compromised Vavi is last person to offer solutions: South African Federation of Trade Unions (Saftu) president Zwelinzima Vavi should be the last person to comment about the current mess in the country.
Read more »
A successful AI strategy starts with the right use cases - TechCentralPromoted | Becoming an AI-driven organisation means fully digitising business processes, writes FNB's Mark Nasila.
Read more »
EXCLUSIVE: FSCA has 75 market abuse cases open involving listed securitiesThe cases include investigations into Steinhoff, Tongaat Hulett, PPC and Ayo Technology Solutions
Read more »
Optimise your business with automation and IAC - TechCentralPromoted | You’ll find “optimising operations” and “increasing efficiency” in almost every business’s list of goals, but how can they be achieved?
Read more »
Create a personalised rewards programme for your apps - TechCentralPromoted | Huawei’s AppGallery offers rewards programmes that allow users to earn points while enjoying your apps.
Read more »