Interviews

Navigating the Zero Trust Landscape: Strategies, Challenges, and Solutions

CXOToday has engaged in an exclusive interview with Mushtaq Ahmad, CIO at Movate

 

What’s the level of interest among customers in adopting Zero Trust?

The concept of Zero Trust has been there for nearly a decade. However, the interest has increased in the last 2 years. The pandemic rampant the proliferation of remote work, WFA, and hybrid work culture. This rushed security adaptations across many enterprises to tackle increased vulnerabilities.

Traditional security operation platforms /tools or alert/event handling responses are no longer adequate to address and prevent sophisticated and advanced threats. Besides, the concept of “implicit trust or trust but verify” does not work well in protecting enterprise network from cybersecurity threats in a post-pandemic world. Today, organizations have been forced to rethink how they handle remote access, WFA/WFH. The security principles have shifted to “never trust and always verify”.

Multiple research reports underline that corporate users and their devices are the weakest links when running outside the corporate security zone in a traditional security framework. These weakest links are magnified with cloud adoption as access to many services and portals are given, assuming that the endpoints in a work-from-anywhere situation are secure.

At Movate, we have deployed advanced security tools on the endpoints that leverage AI/ML-based malware protection, behavioral analysis, data leak prevention, secure browsing, and remote deployment of software. To ensure complete endpoint security, we have introduced a proactive rather than reactive approach to fight against malicious intent and threat actors.

Today’s organizations need a new security model that effectively adapts to the complexity of the modern environment, embraces the hybrid workplace, and protects people, devices, apps, and data, irrespective of their location. And this can be achieved by implementing the Zero Trust architecture.

 

What services are you offering customers to help them implement Zero Trust?

Movate is an adopter of Zero Trust even before the pandemic stuck. Given our experience in collaborating with large teams spread across geographies, we have successfully adapted different kinds of models with ease. We have teams that have been hired in a 100% WFH model, and currently this constitutes about 15-20% of our workforce.

I firmly believe that Zero Trust adoption is a journey and not a replacement of existing infrastructure and process. The journey should start by incrementally adapting the Zero Trust principle across people, process and technology.

The ideal approach would be to operate with a strategy focused more on Zero Trust and slowly phase out the traditional approach to security. Depending on the security posture and maturity, this journey may take anywhere between a few months to 5-6 years as many organizations follow 5-year refresh cycle. In some cases, a greenfield implementation is an option to consider for building the zero-trust process and architecture from ground up.  This is more suited for new age cloud-based companies.

Irrespective of the approach, Movate has the capability to provide greenfield and hybrid Zero Trust solution. Our Zero Trust journey entails the following:

  • Survey of assets, identities, network, data and workflow
  • Risk Assessment of security posture to understand the security maturity level
  • Zero Trust Architecture (ZTA) design and deployment. Process formulation and incremental deployment of Zero Trust architecture.
  • Monitor and iteration of the above steps across processes
  • Continuous monitoring, assessment and implementation of necessary corrective measures
  • Ongoing ZT operations and management.

A single solution or an OEM product cannot provide Zero Trust architecture entirely. It involves multiple products and solutions.  Movate being an early adopter of ZTA and with its experience in supporting multiple customers, is well-positioned to suggest Zero Trust solutions and products that is cost effective, least disruptive with assured business outcomes.

To summarize, Movate can assist customers with:

  • ZTA adoption (Survey, Assessment, Deployment, Monitor & Iterate, Manage & Improve)
  • Green field and hybrid solution
  • Choosing and integrating best in class products, solution and architecture
  • ZTA Managed services

 

Do cloud migration projects, IT modernization efforts and digital transformation initiatives provide opportunities to deploy Zero Trust frameworks?

Greenfield implementation offers a better opportunity to build robust processes and deploy technology solutions from scratch for Zero Trust architecture adoption. Cloud migration projects, IT modernizations or digital transformation journeys should either be “Cloud Native” or a “data center/application transformation activity involving microservices and micro segmentation”, as they offer scale, elasticity, resiliency, and flexibility to adopt Zero Trust as part of the architecture design.

However, this does not mean that an existing legacy IT infrastructure cannot be transformed into a Zero-Trust network. Such cases required a carefully planned ZTA journey that is aligned with the business strategy. Organizations planning to transform their legacy IT infrastructure to ZTA should start with running a hybrid environment for a period of time, a mix of Zero Trust component and traditional IT components; and then change the traditional IT components with Zero Trust components incrementally over a period.

 

What are the challenges customers face in implementing Zero Trust and how do you help them overcome them?

Some of the challenges are listed below:

  • Limited Awareness and Lack of Skill: The fundamental principle of “Zero Trust” is “Verify, but never trust”. The ZTA journey starts with educating and bringing awareness within the organization to create a positive change. It needs sufficient time, careful planning, and a buy-in from all the relevant stakeholders, as its implementation can change the way organizations operate.
  • Technical Complexity: Implementing a Zero Trust Architecture is a complex and time-consuming project. There are different technology stacks and strategies that can help your organisation achieve a Zero Trust architecture.
  • Continuous Administration: The Zero Trust architecture is not a ‘set and forget’ solution, it needs constant monitoring to ensure security of customers’ implementations while aligning them to the modern security framework.
  • High restrictions: ZTA can change the way that users interact with the data and resources within the organization. If not appropriately designed, it can become very restrictive limiting employee productivity. Hence, it’s important to understand and adopt new processes and workflows with careful testing.

If implemented well, the ZTA framework has the potential to elevate an organization’s security posture and protect its assets against eminent cyber threats.

Leave a Response