In the first part of this Zero Trust series, Stratascale (an SHI company) discussed identity management.
In this Horizon Report, we focus on device assurance. When integrating Zero Trust principles into your security program, you should start with identity management. But you can’t rely on identity alone for Zero Trust. You must also tackle device assurance.
Most organizations focus on securing laptops and desktops, leaving other devices vulnerable. Security leaders should work with their organizations to build a device strategy that aligns with their Zero Trust program. An effective device strategy will enable the following:
To learn more, read the full report.
Readers interested in specific executive-level perspectives on zero trust may wish to explore the other publications in this series:
Kacey Clark investigated offensive security methods and trends, defensive strategies, and security solution technologies.