“Zero trust: The origins of this term are from a 2013 research paper by Forrester for NIST titled, Developing a Framework to Improve Critical Infrastructure Cybersecurity. That research was itself based on earlier work into de-perimiterization done by the Jerricho Forum beginning in 2004.”
PROBLEM: Your perimeter has disappeared
Work has fundamentally changed. Critical data has moved to the cloud and employees are able to access it from any network, wherever they are in the world. For example, employees don’t often have to connect to a VPN in order to check their work email or view/download sensitive documents on the go.
Attacks like phishing have also evolved to take advantage of the fact that perimeter security no longer applies. Corporate devices are personal now, as well. Social media apps, messaging apps, and others create an environment where employees can be phished and corporate credentials stolen through personal activities. Year-to-date in 2018, 50.8% of Lookout users with Safe Browsing turned on encountered a phishing link.
Enabling mobility and the ability to access data seamlessly is a great development for enterprise productivity, but it causes a serious challenge to security teams who rely on perimeter provisions such as firewalls and secure web gateways.
SOLUTION: How Lookout allows you to embrace post-perimeter security
Lookout has specifically designed a platform to give enterprises a tangible way to bring post-perimeter security to their workforce. It starts with our data-set of security telemetry from over 160 million devices worldwide and 50 million apps. This gives us an unprecedented depth of insight into the full spectrum of risk, including device, network, app, and content threats and risks. Because of this, Lookout is able to provide enterprises with immediate visibility into potentially harmful scenarios happening on employee devices, at any given point in time.
Download the complete resource to read more in detail.