• Tech News
    • Games
    • Pc & Laptop
    • Mobile Tech
    • Ar & Vr
    • Security
  • Startup
    • Fintech
  • Reviews
  • How To
What's Hot

Elementor #32036

January 24, 2025

The Redmi Note 13 is a bigger downgrade compared to the 5G model than you might think

April 18, 2024

Xiaomi Redmi Watch 4 is a budget smartwatch with a premium look and feel

April 16, 2024
Facebook Twitter Instagram
  • Contact
  • Privacy Policy
  • Terms & Conditions
Facebook Twitter Instagram Pinterest VKontakte
Behind The ScreenBehind The Screen
  • Tech News
    1. Games
    2. Pc & Laptop
    3. Mobile Tech
    4. Ar & Vr
    5. Security
    6. View All

    Bring Elden Ring to the table with the upcoming board game adaptation

    September 19, 2022

    ONI: Road to be the Mightiest Oni reveals its opening movie

    September 19, 2022

    GTA 6 images and footage allegedly leak

    September 19, 2022

    Wild west adventure Card Cowboy turns cards into weird and silly stories

    September 18, 2022

    7 Reasons Why You Should Study PHP Programming Language

    October 19, 2022

    Logitech MX Master 3S and MX Keys Combo for Business Gen 2 Review

    October 9, 2022

    Lenovo ThinkPad X1 Carbon Gen10 Review

    September 18, 2022

    Lenovo IdeaPad 5i Chromebook, 16-inch+120Hz

    September 3, 2022

    It’s 2023 and Spotify Still Can’t Say When AirPlay 2 Support Will Arrive

    April 4, 2023

    YouTube adds very convenient iPhone homescreen widgets

    October 15, 2022

    Google finishes iOS 16 Lock Screen widgets rollout w/ Maps

    October 14, 2022

    Is Apple actually turning iMessage into AIM or is this sketchy redesign rumor for laughs?

    October 14, 2022

    MeetKai launches AI-powered metaverse, starting with a billboard in Times Square

    August 10, 2022

    The DeanBeat: RP1 simulates putting 4,000 people together in a single metaverse plaza

    August 10, 2022

    Improving the customer experience with virtual and augmented reality

    August 10, 2022

    Why the metaverse won’t fall to Clubhouse’s fate

    August 10, 2022

    How Apple privacy changes have forced social media marketing to evolve

    October 16, 2022

    Microsoft Patch Tuesday October Fixed 85 Vulnerabilities – Latest Hacking News

    October 16, 2022

    Decentralization and KYC compliance: Critical concepts in sovereign policy

    October 15, 2022

    What Thoma Bravo’s latest acquisition reveals about identity management

    October 14, 2022

    What is a Service Robot? The vision of an intelligent service application is possible.

    November 7, 2022

    Tom Brady just chucked another Microsoft Surface tablet

    September 18, 2022

    The best AIO coolers for your PC in 2022

    September 18, 2022

    YC’s Michael Seibel clarifies some misconceptions about the accelerator • DailyTech

    September 18, 2022
  • Startup
    • Fintech
  • Reviews
  • How To
Behind The ScreenBehind The Screen
Home»Security»Zero trust is critical as more enterprises sacrifice security for speed
Security

Zero trust is critical as more enterprises sacrifice security for speed

October 12, 2022No Comments6 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
Breaches and intrusions continue growing despite increases in cybersecurity and mobile security budgets. Source: Verizon Mobile Security Index, 2022
Share
Facebook Twitter LinkedIn Pinterest Email

Did you miss a session from MetaBeat 2022? Head over to the on-demand library for all of our featured sessions here.


A record number of employees, 66%, say they are expected to sacrifice security for speed so as not to slow projects down. That’s up from 45% last year. In addition, 79% of employees gave in to the pressure this year, sacrificing security to meet tighter deadlines and higher job expectations. With employees facing growing pressure to sacrifice security to get work done, zero trust becomes crucial to securing every endpoint. 

Verizon’s latest Mobile Security Index found that employees are under more pressure than ever to bypass security when necessary to get work done. The study also showed that the two weakest areas of mobile security are the lack of sufficient endpoint security and human error. Cyberattackers prey on each using social engineering. What’s more? Compounding cyberattackers’ efforts are 62% of cyberattacks attributed to insiders, caused by negligence rather than malicious intent. 

“Now that mobile is critical to business operations, it’s getting more attention from bad actors, too. From coordinated state-sponsored campaigns to unfocused, opportunistic criminal exploits, the volume of attacks is going up,” the Verizon Mobile Security Index report reads.

Mobile device cyberattacks are especially damaging because they strike at the intersection of a person’s identity, privacy and professional life.

Event

Low-Code/No-Code Summit

Join today’s leading executives at the Low-Code/No-Code Summit virtually on November 9. Register for your free pass today.

Register Here

Human error continues to be the leading cause of breaches. Eighty-two percent of all breaches analyzed in Verizon’s 2022 Data Breach Investigation Report started with cyberattacks aimed at users. Breaches begin with social engineering that targets privileged access credentials, phishing campaigns, duplicated or stolen credentials and human error. 

See also  NCSC startups scheme turns focus to operational know-how, SME safety

More spending, more breaches 

Mobile breaches continue to set records despite an uncertain economic climate. Eighty-five percent of enterprises have a budget for cybersecurity today, with 77% saying their mobile security spending increased this year. Sixty-seven percent predict even greater spending in 2023. However, increasing security budgets and allocating more to mobile security isn’t slowing down breaches.

Breaches and intrusions continue growing despite increases in cybersecurity and mobile security budgets. Source: Verizon Mobile Security Index, 2022
Breaches and intrusions continue growing despite increases in cybersecurity and mobile security budgets. Source: Verizon Mobile Security Index, 2022

Verizon found that nearly half of enterprises, 45%, have suffered a breach, intrusion or data exfiltration that originated on a mobile device in the last 12 months. It gets worse for enterprises with more extensive global operations. More than three-fifths, or 61%, have been hit with mobile-based cyberattacks in the last year. That’s significantly more than the 43% of local-operations-only enterprises that have been breached via mobile devices. 

Zero trust can meet enterprises’ need for speed

CISOs are consolidating their tech stacks to increase visibility across every endpoint while reducing costs. At the same time, more organizations are building a business case for adopting zero-trust network access (ZTNA) for increased speed and security. A Microsoft’s report found that 96% of security decision-makers believe zero trust is critical to their enterprises’ success. 

Gartner’s 2022 Market Guide for Zero Trust Network Access provides an analysis of the ZTNA market, its critical vendors and the factors enterprises need to consider when implementing ZTNA frameworks.

“From modern and mobile endpoint defense and device attestation to securing enterprise applications through the complete development lifecycle, enterprises need their security to scale with their data, access, employees, and customers,” Jon Paterson, Zimperium’s CTO, wrote in the company’s 2022 Global Mobile Threat Report. 

Using zero trust to protect every device as a new security perimeter

Implementing a zero-trust framework needs to start with the goal of gaining greater visibility, control and security over every endpoint. IT and security teams need to understand that every device added to their network is a new security perimeter.

See also  Why diversity should have a critical impact on data privacy

As a result, zero trust quickly becomes table stakes as a framework for improving any organization’s security. A previous VB article highlighting the key things CISOs need to know about zero trust identifies how organizations can lay out a roadmap that best fits their business. 

CISOs continue to pressure UEM platform providers to consolidate and provide more value at lower costs

Gartner’s latest Magic Quadrant for Unified Endpoint Management Tools reflects CISOs’ impact on the product strategies at IBM, Ivanti, ManageEngine, Matrix42, Microsoft, VMWare, Blackberry, Citrix and others. Gartner’s market analysis shows that endpoint resilience is another critical buying criterion. Leaders in endpoint security include Absolute Software’s Resilience platform, Cisco AI Endpoint Analytics, CrowdStrike Falcon, CyCognito, Delinea, FireEye Endpoint Security, Venafi and ZScaler.

A report by Forrester names Ivanti, Microsoft and VMWare as market leaders, with Ivanti having the most fully integrated UEM, enterprise service management (ESM) and end-user experience management (EUEM) capability. Leading UEM platforms, including those from VMWare and Ivanti, have multifactor authentication (MFA) designed into the core code of their architectures. As MFA is one of the main components of zero trust, it’s often a quick win for CISOs who have often battled for budget. 

Support BYOD and corporate-owned mobile devices on the UEM platform

Unified Endpoint Management (UEM) platforms are proving capable of delivering device management for corporate device inventories while also supporting bring your device (BYOD) policies. Best-in-class UEM platforms support location-agnostic requirements, including cloud-first OS delivery, peer-to-peer patch management and remote support.

IT and security teams are turning to UEM platforms to help improve users’ experiences while factoring in how endpoint detection and response (EDR) fits into replacing VPNs. Advanced UEM platforms also provide automated configuration management to ensure compliance with corporate standards. 

See also  Zoom’s latest update on Mac includes a fix for a dangerous security flaw

Automated patch management can further reduce the risk of mobile breaches

It’s no surprise that the majority of security professionals see patch management as time-consuming and overly complex. IT and security teams are often overwhelmed with work, forcing patch management lower on their list of priorities. 53% of IT and security teams say organizing and prioritizing critical vulnerabilities takes up most of their time. Ivanti launched an AI-based patch intelligence system earlier this year at RSA.

Ivanti’s Neurons Patch for Microsoft Endpoint Configuration Monitor (MEM) is noteworthy because it relies on a series of AI-based bots to seek, identify and update all patches across endpoints that need to be updated. Additional vendors providing AI-based endpoint protection include Broadcom, CrowdStrike, SentinelOne, McAfee, Sophos, Trend Micro, VMWare Carbon Black and Cybereason. 

Mobile devices predict the future of zero trust 

Digital-first business plans dominate most businesses’ IT, security, sales and marketing plans today. But it’s the mobile devices in the hands of employees, suppliers and customers that are the endpoints that impact each strategy’s success or failure.

Instead of relying on legacy tech stacks to support next-generation digital revenue strategies, it’s time for more businesses to consider how to define a zero-trust framework that can help consolidate tech stacks while removing barriers to users’ productivity. The goal is to secure every endpoint as a new security perimeter without affecting users’ productivity. Zero trust is making that happen on mobile devices today.

Source link

Critical enterprises sacrifice security speed Trust
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

Bitdefender Total Security review

March 6, 2024

Avast Premium Security review

March 6, 2024

Eset Home Security Ultimate review

January 23, 2024

AVG Internet Security review

October 31, 2023
Add A Comment

Comments are closed.

Editors Picks

10 Tips For Building A Successful Podcast

March 27, 2023

Chris Wright’s Path To Hospitality Excellence

August 14, 2023

3 Things Businesses Must Do To Avoid Becoming Irrelevant In The AI Revolution

May 10, 2023

OnePlus Nord Buds 2 review

April 21, 2023

Subscribe to Updates

Get the latest news and Updates from Behind The Scene about Tech, Startup and more.

Top Post

Elementor #32036

The Redmi Note 13 is a bigger downgrade compared to the 5G model than you might think

Xiaomi Redmi Watch 4 is a budget smartwatch with a premium look and feel

Behind The Screen
Facebook Twitter Instagram Pinterest Vimeo YouTube
  • Contact
  • Privacy Policy
  • Terms & Conditions
© 2025 behindthescreen.uk - All rights reserved.

Type above and press Enter to search. Press Esc to cancel.