Intelligent CXO Issue 16 | Page 17

TECH TRENDS
4 . Working from anywhere is the new norm
5 . The number of IoT devices is skyrocketing
Many analysts predict that remote working is here to stay and organisations must find ways to bring the same level of enterprise security to the home office . With hybrid working becoming the new norm , organisations are evolving into a hyper-distributed Edge environment and they are no longer able to create a security perimeter around the enterprise network . A fully centralised IT network is no longer sustainable and organisations must now adopt a distributed approach to securing remote connections .
In the post-COVID world , organisations are using a growing number of IoT devices ranging from surveillance cameras , POS terminals , sensors and many more . These devices represent a significant threat as they are built on a simple architecture and most can ’ t run a security agent . Additionally , some industries like manufacturing face even more risks because they are witnessing the convergence of IT and OT ( Operational Technology ) networks that used to be separated in the past .
Jacob Chacko , Regional Director – Middle East , Saudi & South Africa at Aruba , a Hewlett Packard Enterprise company
Some access points now integrate SD-WAN capabilities forming a secure tunnel via simple Internet and 5G connections . With these access points , organisations can truly implement a cybersecurity mesh strategy to create a smaller perimeter around every access point or device no matter where they are located . This distributed approach gives enterprises better control over cybersecurity risks by securing an individual access point instead of a large perimeter without clear boundaries . With this approach , no device is trusted by default and security policies are enforced at the identity level .
Advanced SD-WAN solutions implement a Zero Trust architecture that complements SASE . Zero Trust frameworks assume that no user or device is inherently trustworthy .
They integrate dynamic segmentation that can segment the network into multiple zones while ensuring users or devices can only connect with destinations on the network that are consistent with their role . This segmentation of the network prevents the spread of a malicious code into the enterprise network in case of an cyberattack . x
www . intelligentcxo . com
17