![]() ![]() Zero-trust authentication shouldn't hinder productivity. With each new OS and app update for Apple devices, Jamf administrators must ensure they enforce the proper minimum state of each application and OS. The post-transition benefits are clear and undeniable, but getting there can take up a lot of an IT department's most valuable resource: time.Īdditionally, zero trust isn't something that IT can implement without a consistent, hands-on approach to maintenance. Moving from a VPN security framework to zero trust is like transitioning from an on-premises management platform to a cloud-based one. But there are challenges that IT teams face as they try to implement zero trust architecture. Zero trust adoption is growing in the enterprise. "There should always be siloed access to data and no assumptions that a device or user is secure."Ī zero-trust approach to authentication can prevent security breaches from escalating to affect credentials that have access to an organization's entire backend system. "Zero trust is what we should have been doing as administrators all along," Williams said. But organizations don't want to rely on such heroics to protect their data. ![]() The fast response from Williams saved his organization from unknown amounts of trouble. Zero trust is what we should have been doing as administrators all along.ĭaniel WilliamsHead of internal systems at an ISP "I ran upstairs to the server room and manually pulled every power plug to shut everything down because I realized we were in the middle of an attack," he said. An attack that bypasses such protections can lead to devastating results if zero trust is not in place.ĭaniel Williams, head of internal systems at an ISP in Tennessee, once got a support call from a user that was having trouble accessing their files. When remote work became the norm in many organizations, IT teams needed to ensure that all outside users trying to access company data went through the proper channels of authentication. When all users were in the office, there was an inherent authentication factor: the location of a user's login to the network. "Zero trust will be difficult to implement until it can be truly seamless. "Zero trust is the way of the future, but it's not just a switch you can flip," said Chris Cashman, head of IT and security at Allwhere, a zero-touch inventory management service provider. But organizations must invest significant resources and time to implement and maintain zero trust. The newest features from Jamf's suite of Apple management software can help organizations adopt zero-trust architecture. The zero-trust security model - an approach to end-user security that verifies and runs users through an authentication process by default rather than trusting a device, a set of user credentials or any other component - is especially critical in a remote work environment. At the Jamf Nation User Conference 2022, an annual event hosted by Apple management software and service provider Jamf, the expert speakers and session leaders underscored the importance of zero trust. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |