How to Apply Zero-Trust Principles to Strengthen Endpoint Security by Gartner®

How to Apply Zero-Trust Principles to Strengthen Endpoint Security by Gartner®
How to Apply Zero-Trust Principles to Strengthen Endpoint Security
In modern workplace environments, endpoints are more exposed to threats and become a larger attack surface, which increases security risk levels for organizations. Security and risk management leaders can use this research to extend zero-trust principles to endpoints and enhance workspace security.
Key Highlights:
To reduce this increased threat exposure and implicit trust on endpoints in modern work environments, security and risk management (SRM) leaders responsible for endpoint security should:
- Extend zero-trust principles to endpoints that access corporate resources by removing implicit trust
- Continuously verify the device, user, configuration and identity permissions to reduce the overall attack surface
- Provide limited access to resources securely on unmanaged devices by using technologies such as enterprise browsers and virtual desktop infrastructure(VDI)/desktop as a service (DaaS)
This research focuses on how to apply the zero-trust principles using various endpoint security and management technologies and tools. Use the three steps in Figure 1 to implement zero-trust principles on endpoint devices.
GARTNER and associated reports are registered trademarks of Gartner, Inc. and/or its affiliates in the U.S. and internationally and is used herein with permission. All rights reserved.
How to Apply Zero-Trust Principles to Strengthen Endpoint Security by Gartner®
"Zero trust is a security paradigm that replaces implicit trust with explicit trust by continuously assessing risk and trust levels, based on identity and context."
How to Apply Zero-Trust Principles to Strengthen Endpoint Security
In modern workplace environments, endpoints are more exposed to threats and become a larger attack surface, which increases security risk levels for organizations. Security and risk management leaders can use this research to extend zero-trust principles to endpoints and enhance workspace security.
Key Highlights:
To reduce this increased threat exposure and implicit trust on endpoints in modern work environments, security and risk management (SRM) leaders responsible for endpoint security should:
- Extend zero-trust principles to endpoints that access corporate resources by removing implicit trust
- Continuously verify the device, user, configuration and identity permissions to reduce the overall attack surface
- Provide limited access to resources securely on unmanaged devices by using technologies such as enterprise browsers and virtual desktop infrastructure(VDI)/desktop as a service (DaaS)
This research focuses on how to apply the zero-trust principles using various endpoint security and management technologies and tools. Use the three steps in Figure 1 to implement zero-trust principles on endpoint devices.
GARTNER and associated reports are registered trademarks of Gartner, Inc. and/or its affiliates in the U.S. and internationally and is used herein with permission. All rights reserved.
The Absolute Platform
機能または利点の簡単な説明または概要を記入してください。なぜ価値があるのか、どのようにユーザーに役立つのかを説明してください。
Other foundational components of the Absolute Platform that enable the Absolute Secure Endpoint™ and Secure Access™ products are as follows:
- Web console
- Mobile app
- Rules and policy engine
- Alerts
- Dashboards
- APIs
- Application Persistence-as-a-Service SDK
- Third-party integrations (e.g., SIEM, ITSM)