Effective Ways to Establish a Zero Trust Security ModelZscaler's Sudip Banerjee on Simplifying Zero Trust Implementation in the Cloud
IT and security organizations can simplify the zero trust journey in the cloud by allowing internet traffic to go directly to the required destination instead of routing through the data center, says Sudip Banerjee, field CTO for Zscaler for the Asia-Pacific and Japan region.
"Gone are the days when you had to set up your security policy in different technology layers, which means there are multiple points of controls, multiple enforcement and logging, which brings a lot of complexity," Banerjee says.
Taking a zero trust approach to security in the cloud, he says, ensures that all traffic is encrypted and all policies are set up in one business language using an IP protocol. "This is simple to manage, and getting logs to SIEM or SOC becomes easier with this model," he says.
In this video interview with Information Security Media Group at ISMG's Cybersecurity Summit held in Mumbai, Banerjee discusses:
- How zero trust can help balance risk and agility;
- Why zero trust architecture supports faster threat detection;
- How to achieve tactical and operational goals with zero trust.
Banerjee has expertise in the banking and finance industry, with experience in driving digital transformation programs, enabling public cloud SaaS adoption and re-architecting network infrastructure for enhanced user productivity.