Zero Trust, as a required technology for enterprise, has been accelerating for the last several years based on the restructuring of corporate workplace to include remote working policies which highlighted the vulnerabilities in company networks.
Pavel Gurvich, Senior Vice President & General Manager, Enterprise Security Group with Akamai speaks with Don Witt of the Channel Daily News, a TR publication, about the Akamai Zero Trust architecture. Zero Trust is first conceptualized and then Pavel reviews the implementation strategy of Akamai.
Pavel GurvichIt is an evolving process which includes Zero Trust Network Access, Micro-segmentation, Application Access restrictions and MFA. With all of this implemented, it is vital to provide the monitoring of all aspects of the network to ensure that no breach has been made, all devices are working properly and at the latest revision levels are deployed. Listen in to a very good description of Zero Trust and their implementation.
Over 20 years ago, they set out to solve the toughest challenge of the early internet: the “World-Wide Wait.” And they’ve been solving the internet’s toughest challenges ever since, working toward their vision of a safer and more connected world.
With the world’s most distributed compute platform — from cloud to edge — they make it easy for businesses to develop and run applications, while they keep experiences closer to users and threats farther away. That’s why innovative companies worldwide choose Akamai to build, deliver, and secure their digital experiences.
Their suite of leading security, compute, and delivery solutions are helping global companies make life better for billions of people, billions of times a day.
For more information, go to: https://www.akamai.com/