GITEX Tech Vision Innovations Supplement 2021

Page 34

ZERO TRUST SECURITY IS CRITICAL Avinash Advani, Founder and CEO of Cyberknight, has expressed his belief that Zero Trust Security needs to be at the forefront of the minds of decisionmakers when it comes to implementing their digital transformation strategy.

Can you outline to us how your company has demonstrated its ability to leverage its technological expertise to help business transform their day-to-day operations to adapt, evolve and meet the demands of the digital economy? CyberKnight is a cybersecurity advisor and a VAD. We have tailor-made our portfolio offering around Zero Trust Security. As we emerge from the pandemic, several key dynamics are being considered in upcoming plans that put Zero Trust Security at the top of the Board agenda. Firstly, security decision makers are now looking to optimise their secure remote access as well as cloud architectures, since many organisations were thrown into work-from-home mode overnight when the pandemic struck. They instantly realised the inefficiencies and pitfalls of traditional security infrastructures. Secondly, as the perimeter suddenly grew exponentially with remote working, managing trust became a challenge, and ensuring that the right users, applications, and devices were given access to sensitive data

34

GITEX TECH VISION 2021

became even more critical. Thirdly, digital transformation initiatives have accelerated and complex hybrid environment that ensue, naturally introduce security gaps which need to be bridged with intelligent cybersecurity. Lastly, cyber-attackers have been taking advantage of the expanded attack surface and the number and types of attacks have increased dramatically. Our ZTX methodology incorporates emerging and market-leading cybersecurity solutions that protect the entire attack surface, by leveraging AI, threat intelligence and collective defense. CyberKnight helps security and risk teams at enterprise and government customers simplify breach detection, prevention, and incident response, while addressing regulatory compliance. Digital Transformation has accelerated rapidly since the onset of the pandemic in 2020, but as an IT leader and expert, what are the key principles and processes businesses need to define and determine

before embarking on their digital transformation journey? Zero Trust Security fundamentally secures digital transformation, but there are some critical assumptions that need to be considered, followed by key steps that need to be taken. Organisations first need to focus on data-centric security, which always follows sensitive data. Then, it is important to be aware that the network is always hostile from omnipresent internal and external threats. It is also essential to look at trust differently from traditional security architectures, wherein the internal network no longer equals trustworthiness. Finally, every user, device and traffic flow will need to be proven while logging and inspecting all traffic. When the journey to Zero Trust Security begins, businesses first need to discover and identify their sensitive data. They must be able to answer the questions, “Where is my sensitive data and who owns it?”. Then, they will need to gain visibility and map the flows of the sensitive data

www.tahawultech.com

@tahawultech


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.
GITEX Tech Vision Innovations Supplement 2021 by tahawultech·com - Issuu