A Data-Centric Approach to Zero Trust StrategyTwo Experts From Varonis Share Their Views on the Right Approach to Zero Trust
How can companies take a data-centric approach to their zero trust strategy? Two experts - Scott Leach, vice president Asia-Pacific at Varonis, and Maheswaran Shanmugasundaram, country manager for South Asia at Varonis - share why getting a handle on your data helps improve cybersecurity.
See Also: Evaluating ZTNA: 10 Considerations
"It is all about making sure that employees only have access to information they need to do their jobs. Attackers are going after the data, and the average user has access to far too much information," Leach says.
Studies have shown that an average user has access to 17 million files on the first day of their job, he adds.
"Most cybersecurity strategies are created to protect the most important assets of the organization, and ... their key asset is data. If their cybersecurity initiatives are based around data, they would be in a much better state to predict and contain breaches significantly," Shanmugasundaram says.
In this video interview with Information Security Media Group at ISMG's Cybersecurity Summit held in Mumbai, Leach and Shanmugasundaram discuss:
- Why a data-centric approach to zero trust is beneficial;
- How to ensure a holistic or unified understanding of data;
- The importance of data loss protection.
Leach leads Varonis' Asia-Pacific business and is responsible for Australia, Singapore, India and Japan. He has more than 20 years of experience in sales and management in leading multinational corporations. Prior to joining Varonis, he was general manager in APAC at cybersecurity firm Secureworks.
Shanmugasundaram is responsible for expanding the Varonis business in South Asia, one of the organization's key APAC markets. He has more than two decades of experience across security technologies and processes.