CIOs should combine Zero Trust and Secure Access Service Edge (SASE) strategies to safeguard their organisation’s resources from cybersecurity attacks, experts say.
In a presentation during CIO Africa Cloud & Security Summit, Territory Manager at Symantec by Broadcom Software, Djamil Jaddoo and Technical Manager at Symantec by Broadcom Software, Tharvesh Takoory, say when used together, the two approaches would help safeguard organisations from cyberthreats.
Tharvesh advised organisations to adopt the zero-trust approach to thwart hackers from physically accessing critical company resources that may expose them to cybersecurity risks.
“Zero trust is based on verifying every user. It is based on verifying every user. It is centred on the belief that organizations should not automatically trust anything inside or outside their perimeters and must verify everything trying to connect to its resources before granting access – based on identity, context and trustworthiness,” Tharvesh said.
According to Tharvesh, Zero Trust sits between people, devices and networks. Organizations should ensure that only the right people get access to the resources that they need. They should also manage the devices that access their networks and should have come up with practices that monitor, audit, and safeguard their networks from cyber-attacks.
In coming up with a Zero-Trust strategy, Tharvesh advises organisations to first define it starting with access, then prioritize capabilities, identify useful technologies to be used in the process, come up with data security policies for hybrid cloud and enable secure access to internal apps.
Moreover, organisations can achieve Zero Trust through SASE. SASE is an emerging offering combining comprehensive WAN capabilities with comprehensive network security functions to support the dynamic secure access needs of digital enterprises.
“SASE creates the structure that makes Zero Trust flexible and easy to manage by pushing simple, fast, flexible and scalable security to the service edge. It helps organisations manage their tech and infrastructure approaches from one location. It creates the structure that makes Zero Trust flexible and easy to manage,” Djamil said.