Video

Getting to Zero Trust Requires Good Cybersecurity Baselines

ManageEngine's Harish Sekar on the Challenges of Addressing How to Do Zero Trust
Harish Sekar, senior technical evangelist and head of business development, ManageEngine

Getting to zero trust is a "huge process," says Harish Sekar of ManageEngine. Solution providers "say 'what' needs to be done but they don't talk about how,'" he says, and companies need help with that.

See Also: Live Expert Panel | Threat Detection & Incident Response for IoT

Because the process "takes meticulous effort," Sekar says, "baselines are very important. People forget the baselines and say machine learning can take care of what's required, but without baselines, machine learning can't do anything.

"If your baselines are good and you have a good work etiquette about educating users on what needs to be done and monitor everything in your perimeter in almost real time, you are in good shape to get to zero trust," he says.

In an interview with Information Security Media Group at ISMG's Cybersecurity Summit in Bengaluru, Sekar also discusses:

  • How to handle product sprawl;
  • How integrated solutions, not siloed ones, help management get visibility;
  • The importance of reading false positives.

Sekar has more than 10 years of experience managing business growth in terms of customers and revenue. At ManageEngine, his responsibilities include executing and accelerating product road map and strategy and articulating product/platform/tech partner strategies. He is focused on growing partnerships and accelerating strategic initiatives in collaboration with other cross-functional teams and streamlining channel management processes.


About the Author

Prajeet Nair

Prajeet Nair

Principal Correspondent, ISMG

Nair is principal correspondent for Information Security Media Group's global news desk. He has previously worked at TechCircle, IDG, Times Group and other publications where he reported on developments in enterprise technology, digital transformation and other issues.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.