Device Identification , Endpoint Security , Fraud Management & Cybercrime
Zero Trust in the Cloud: Keeping It Simple for Users
Forcepoint's Ajay Kumar Dubey on Overcoming Complexity in the CloudEnterprises just starting their cloud journey should take a zero trust approach in everything they do, says Ajay Kumar Dubey, channel partner with Forcepoint.
See Also: Preparing for New Cybersecurity Reporting Requirements
"We need zero trust content. So anything that enters my laptop, my device, my network - it needs to be completely malware-free. I also need zero trust access," Dubey says.
Security teams need to reduce complexity and create an interface for users that is easy to use and understand. "In other words, keep your complexity under the hood, but give me a dashboard that is foolproof and simple to use," he says.
While security is an imperative, Dubey says, users need to be able to access data on their corporate or personal devices anytime, anywhere. The cloud, combined with zero trust principles, gives users the access they need while safeguarding highly sensitive data, he adds.
In this video interview at Information Security Media Group's Cybersecurity Summit in New Delhi, Dubey also discusses:
- How cloud infrastructure creates complexity and gaps that can be exploited by attackers;
- The advantages of deploying applications in the cloud and monitoring user activity;
- The "formidable combination" of the right zero trust approach combined with content, access, data and user security.
Dubey is responsible for managing the midmarket business in India and the channels for India and SAARC. He is a cybersecurity expert with over 24 years of experience in the IT industry and has worked at Blue Coat Systems, Sun Microsystems and Aventail.