The Significance of Zero Trust for the Apple Enterprise

The Significance of Zero Trust for the Apple Enterprise

Once upon a time, digital business sat inside the⁤ security perimeter. Devices were kept in offices, shared the same network, and ‍were protected by antivirus software, firewalls, and software updates. This system wasn’t perfect and became increasingly specialized, with ⁢security teams, networking teams, and others all working in different‌ sectors.

With mobility, this changed. Devices were unleashed from their locations, used ‌their ​own networks, and stood outside of traditional corporate endpoint protection.

The pandemic ​accelerated these changes, fostering the evolution of innovative security protections outside of⁤ traditional perimeters, such as around zero-trust. The ‍global zero trust security market is now expected to reach $99 billion by⁣ 2030, up from $23 billion in 2021.

What is ⁢zero⁢ trust?

Definitions differ, but verification is critical to how this security model works. That means that everyone‍ — every location, every user, every device, even every app — ⁣is blocked⁢ from access to enterprise assets and⁤ services‍ until they can prove they should‌ have such access.

The philosophy is that breaches⁤ are inevitable ⁤and that threats can come ⁤from anywhere, including within the network. The National Institute of Standards and Technology (NIST), part of the US Department of Commerce, explains it this way: “Zero trust ​refers to ⁢an evolving set of ⁣cybersecurity ​paradigms that move defenses from ⁣static, network-based ⁤perimeters to⁣ focus on users, assets, and resources.”

When used alongside⁢ device management services such ‌as Jamf, Mosyle, Kandji, and others, additional factors, including location, device-specific data,‍ and may also come into ‍play to further secure the device and ⁤its⁢ communications. The idea is that even as the number of potential security vulnerabilities increases, the core ⁢protection‍ on the​ device — the zero⁤ trust protection — brings a layer of authentication and oversight to protect interactions in the first ⁤place, and to speed ⁤up response⁤ when things go wrong.

That’s zero trust,⁤ or at least what it attempts to deliver. It’s also going to become mandatory across digital business in the years to ⁢come.

That’s a simplification of a compound‍ of complementary technologies, of course, but the end game should be that no⁤ matter what devices your employees use, what apps they employ, and ⁢where ⁣they are accessing your networks from, you can be fairly certain ‍access is ​legitimate. Your SaaS⁢ applications and company ​data remain secured no matter where or how ‌your people access it.

Why it matters to Apple admins

Apple’s fast-growing position in the enterprise is a huge opportunity ​for Apple‌ admins. They come to the space relatively less encumbered ⁣by the ⁤traditional silo-based approach to security and have the ‍advantage that‌ most key ‍Apple device management systems already support the superior security magic that is zero trust.

Because they aren’t constrained by an ⁤old approach, Apple techs have…

2023-10-05 20:24:03
Source from www.computerworld.com rnrn

Exit mobile version