________________________________________________________________________________________________________
Netskope gapped ’ from information technology ( IT ) and other outside risks . In short , OT-based systems were kept secure through isolation . However , increasing convergence between IT and OT systems - including via cloud apps - means that manufacturers must now reevaluate how they protect their people , data , and operations from theft and disruption .
Organizations need to embrace a cybersecurity strategy that continuously adapts and controls the level of trust given to users and applications based on everchanging sets of contextual factors . This is essentially what a zero trust approach offers . Zero trust principles address the risks presented by OT / IT convergence and directto-cloud access by : 1 ) removing implicit trust at the access level ; 2 ) enforcing policybased controls based on the least amount of privilege required ; and 3 ) continuously monitoring in support of ongoing policy refinements .
How a SASE architecture can underpin a zero trust strategy
So how can manufacturers take zero trust from principle into practice within their security programs ? Secure access service edge ( SASE ) is the technical architecture that offers the critical benefits of a zero trust approach - enabling fast and reliable network performance while securing transactions wherever users and data go .
A SASE architecture unifies networking and security services , which allows it to protect users , applications , and data wherever they exist across the organization - even cloud-based resources and remote users . SASE can provide this kind of anywhere / anytime secure access because delivering protection at the network edge doesn ’ t incur performance penalties from backhauling traffic to a centralized datacenter for inspection and policy enforcement .
manufacturing-today . com 39