A new approach to security


As mobile devices have become increasingly ubiquitous in the workplace, the need for a new security architecture has arisen. The traditional security model no longer applies in a mobile environment, where users can easily access corporate data from any location. Zero Trust for mobile endpoints is the key to keeping your organization safe in today’s climate. The Lookout team has released a whitepaper on Zero Trust for mobiles and we discuss its advantages over traditional approaches in this post. 

Why is Zero Trust becoming important? 

With cloud adoption on the rise, data is everywhere, and it can be accessed from any device. Security teams who rely on traditional perimeter provisions such as firewalls and secure web gateways will find this as a challenge because enterprise information no longer resides there -it’s fluid, moving around within global networks where employees have easy access to data through their smartphones or laptops. 

This trend has resulted in new security necessities. With perimeters disappearing, key security functions will have to be moved to the mobile endpoints so that the security is there where the data is accessed by the employees. By implementing the Zero Trust access model for mobile, the device health can be continuously checked in order to allow access to corporate data. 

How Zero Trust architecture ensures security 

The Zero Trust security strategy is a new approach to mobile endpoint protection and access that takes into account the dynamic nature of connections between an employee’s device, and corporate data stored in cloud-based servers. This continuous conditional access security model encompasses endpoint protection, access to the cloud and identity. 

The crucial aspect of Zero Trust architecture is to assess the device risk using endpoint protection.  By continuously checking threats or risks on the device, an organization can decide whether an employee device is healthy enough to be authenticated and provided access to corporate resources. Every endpoint security model should include mobile endpoints.  

Providing protected access to corporate cloud data without the help of traditional perimeters is another crucial aspect of…

Source…