SecureTechWhitePapers

Putting the trust in zero trust: Post-perimeter security for a new age of work

Lookout has specifically designed a platform to give enterprises a tangible way to bring post-perimeter security to their workforce.


Putting the trust in zero trust: Post-perimeter security for a new age of work
Published By - hitechnectar

“Zero trust: The origins of this term are from a 2013 research paper by Forrester for NIST titled, Developing a Framework to Improve Critical Infrastructure Cybersecurity. That research was itself based on earlier work into de-perimiterization done by the Jerricho Forum beginning in 2004.”

PROBLEM: Your perimeter has disappeared

Work has fundamentally changed. Critical data has moved to the cloud and employees are able to access it from any network, wherever they are in the world. For example, employees don’t often have to connect to a VPN in order to check their work email or view/download sensitive documents on the go.

Attacks like phishing have also evolved to take advantage of the fact that perimeter security no longer applies. Corporate devices are personal now, as well. Social media apps, messaging apps, and others create an environment where employees can be phished and corporate credentials stolen through personal activities. Year-to-date in 2018, 50.8% of Lookout users with Safe Browsing turned on encountered a phishing link.

Enabling mobility and the ability to access data seamlessly is a great development for enterprise productivity, but it causes a serious challenge to security teams who rely on perimeter provisions such as firewalls and secure web gateways.

SOLUTION: How Lookout allows you to embrace post-perimeter security

Lookout has specifically designed a platform to give enterprises a tangible way to bring post-perimeter security to their workforce. It starts with our data-set of security telemetry from over 160 million devices worldwide and 50 million apps. This gives us an unprecedented depth of insight into the full spectrum of risk, including device, network, app, and content threats and risks. Because of this, Lookout is able to provide enterprises with immediate visibility into potentially harmful scenarios happening on employee devices, at any given point in time.

Download the complete resource to read more in detail.


You May Also Like to Read:
Mobile Phishing 2018: Myths and facts facing every modern enterprise today
Gartner Market Guide for Mobile Threat Defense 2018

Add Comment

Click here to post a comment

five × two =

Download the complete Resource:

I would like to receive communications from HiTechNectar and consent to the processing of the personal data provided above in accordance with and as described in the privacy policy.


Translate »
Social media & sharing icons powered by UltimatelySocial