Seguridad Mania.com - España y América Latina
Portal sobre tecnologías para la seguridad física
- Destacamos »
- software Anti Blanqueo
PR Newswire
SAN FRANCISCO, Nov. 17, 2021
SAN FRANCISCO, Nov. 17, 2021 /PRNewswire/ -- Symmetry Systems, the leading provider of cloud data security, today released a new report, "Why Zero Trust is Important." Conducted by Osterman Research, the study details how organizations are deploying zero trust architecture. More than 90 percent of respondents confirm their organization is planning an enterprise-wide deployment for a zero trust architecture or within multiple business units.
"Zero Trust principles protect enterprises' most valuable assets -- today, their people and, with Symmetry, their data. Zero trust for data means that all data objects are guarded and monitored across their data lakes and production data stores," said Mohit Tiwari, Co-Founder and CEO, Symmetry Systems. "Attacks will come, through phished identities, compromised applications, malicious insiders or supply-chain software, and when they do, Zero Trust for data will ensure that authorization and risk-analyses drive attackers into a corner."
The report reveals that respondents expect zero trust to double the efficacy of their cybersecurity protections and consider deploying the architecture to be a top-5 business priority. Other key findings include:
"Today's threat environment is drastically different from what we have experienced even in recent years – with relentless cyberattacks, the adoption of cloud services and mass remote or hybrid work," said Michael Sampson, Senior Analyst at Osterman Research. "Many organizations have begun the transition to a zero trust architecture and those who have not are behind the curve."
Martijn Loderus, VP of Solution Engineering & Delivery at Symmetry System, adds, "Our clients value that Symmetry Systems brings zero trust to data by measuring data objects' risk based on the permissions and accesses in place. We then execute controls and remediation efforts on the data with artificial intelligence and machine learning technology that is capable of mitigating data risk across an entire organization."
Join Michael Sampson, Senior Analyst at Osterman Research, and Martijn Loderus, VP of Solution Engineering & Delivery at Symmetry Systems, for a deep dive into zero trust for data security and how it is effectively deployed within business architectures. To attend the webinar on Thursday, December 2, please register here.
To download "Why Zero Trust is Important," visit https://www.symmetry-systems.com/why-zero-trust-is-important
About Symmetry Systems
Symmetry Systems is a cloud data security platform that safeguards data in AWS, GCP, Azure services and on-premise databases while supporting a zero trust model. With Symmetry, security and compliance teams can address threats quickly. Symmetry provides visibility into data risks from excessive permissions and anomalous data flows while giving organizations the evidence required to demonstrate compliance best practices.
Born from the award-winning Spark Research Lab at UT Austin, Symmetry is backed by leading security investors ForgePoint Capital and Prefix Capital with participation from Accenture Ventures. Symmetry provides solutions for the most demanding security teams. For more information about Symmetry Systems, please visit www.symmetry-systems.com or follow us on Twitter or LinkedIn.
Media Contact:
Allison Arvanitis
Lumina Communications for Symmetry Systems
symmetrysystems@luminapr.com
View original content to download multimedia:https://www.prnewswire.com/news-releases/research-zero-trust-is-expected-to-double-the-efficacy-of-cybersecurity-protections-301426364.html
SOURCE Symmetry Systems
Publicamos interesante Informe de más de 48 págs y varios videos demostrativos sobre los posibles ataques a los robots de montaje de las fábricas. ... Leer más ►
Publicado el 22-Jun-2017 • 10.48hs
Publicado el 20-Jun-2017 • 20.22hs
Dirigido tanto a los principiantes, como a los expertos en seguridad informática y sistemas de control industrial (ICS), este libro ayudará a los lectores a comprender mejor la protección de normas de control interno de las amenazas electrónicas. ... Leer más ►
Publicado el 3-Ene-2012 • 20.16hs
Publicado el 25-Set-2009 • 01.26hs
Publicado el 17-Dic-2008 • 08.32hs