Renaissance Spotlight:

Why Trust Zero Trust?

Never Trust, Always Verify

What is Zero Trust?

Resources

The Zero Trust Network model was created in 2010 by John Kindervag, principal analyst at Forrester Research. Now, ten years later, CIOs, CISOs and other corporate executives are increasingly implementing Zero Trust as the technologies that support it move into the mainstream.

The pressure to protect enterprise systems and data is growing as attacks become more sophisticated. Zero Trust is a security concept centered on the belief that organizations should never automatically trust anything inside or outside its perimeters and instead verify everything trying to connect to its systems before granting access.

The National Security Agency: Embracing a Zero Trust Security Model, provides recommendations for implementing a Zero Trust strategy.

Our Vendors in Zero Trust

 
Entrust
ForgeRock
Ilantus
Keeper
Kemp
 
 
safe-t
Threatlocker
unisys
 

Gain Valuable Insights from On-Demand Webinars

Zero Trust World: This is the Way

Articles

By now, many companies have accepted that working from home and remote working are likely to become the new ‘normal’. But that doesn’t necessarily mean their network and systems are up to the task. Read the full article here.

working from home

In this blog, ForgeRock's Chief Security Officer Steve White explains why an effective security program must be identity-centered.

forgerock blog

‘Zero trust’— this can often sound like just another buzz word for security solutions. The value this term holds is often clouded by the myths that surround it. Either by the wrong information or owing to the term itself. Click here to learn more.

myth buster

In Keeper's Workplace Password Malpractice Report, 57% of employees admitted to writing their passwords on sticky notes. With so many passwords to manage, it is easy to understand why employees are at a higher risk of phishing. Read more.

Sometimes viewed as a replacement of existing defense capabilities, in reality, zero trust is a security posture augmentation with a stronger focus on identity, segmentation and controlling access from entities, whether they are part of your “trusted” environment or not.

Read more.

Forrester has recently released their much anticipated Q3 2020 Tech Tide: Zero Trust Threat Prevention Report. This year’s report included Safe-T’s ZoneZero™ Zero Trust Network Access solution. Click here to learn more.

threat prevention report

We are moving from a situation when an organisation’s network was inside its walls and the Internet outside, to a situation where everything is based on the Internet, which is shared by all organizations’ networks. Read more.

Man working from home

Your data centre is an attractive target for hackers because typically it houses your organization’s most sensitive data. This article covers the expanding list of attack vectors and areas of exploitation as your digital footprint increases.

data centre security

Podcasts and Videos

Zero Trust, a model that involves assuming every entity attempting to connect to your environment is a potential threat actor, instrumenting granular access control, application-level micro-segmentation, and a least privileged access model. Sounds complicated - where do you start, how do you begin adopting these principles, and what are the options?

Join Danny Jenkins (CEO and Co Founder of ThreatLocker) on this podcast where we define some cybersecurity terms that are often used but rarely understood. Discover the true definitions for "zero trust" and "application whitelisting." You'll learn where these tools fit into your cybersecurity toolbox and find out their strengths (and weaknesses). 

Cybersecurity Expert Podcast

What lessons can Operational Technology share with Information Technology in securely deploying IoT? Chris Blask draws from his 25+ years of experience in manufacturing, combines that with his security expertise, and makes some interesting recommendations about how to securely deploy IoT.

IoT

In this episode, Ashwin Pal, Director of Cybersecurity in Asia Pacific for Unisys, examines the steps that need to be taken to secure Operational Technology environments.

Operational Technology Security

Kemp’s zero trust architecture provides unique value by native, application-centric proxy capabilities. In this 5-in-5 video, we will discuss what Zero Trust is and why it's important for organizations.

With ZoneZero’s fast deployment, you can easily implement a new SDP solution, enhance your existing VPN infrastructure with ZTNA, and add MFA to any VPN, service, and application.

About Renaissance

Renaissance Ireland

We work with our partners to deliver solutions and services to make your clients and customers IT environments more secure and compliant and future proof these solutions by tailoring these to suit their needs and requirements. Renaissance and our suite of security vendors and partners are ideally placed to work with  industrial organisations to help analyse current security systems, design a way to improve them, and deliver the improvements over time. Starting with the most critical systems and vulnerabilities. Learn more.

 

Speak to Renaissance about

Zero Trust

 
Renaissance Contingency Services Ltd 
Unit 8, Leopardstown Business Centre, Ballyogan Road, Dublin 18, Ireland Eircode D18wd62
Tel: +353 (1) 2809410      Email: info@renaissance.ie