[ad_1]
Dell says it uses the Microsoft Zero Trust service to provide Identity & Endpoint Protection to protect Microsoft users.
Today, it is assumed that malware and other types of attacks can penetrate perimeter security defenses such as firewalls and enter an organization’s IT network. A good strategy is to minimize the internal attack surface and provide fast and granular recovery services for data encrypted or otherwise corrupted by ransomware. The Zero Trust idea treats every user as a potential attacker, granting them the bare minimum access status they need while verifying their data access and limiting their blast radius.
Mustafa Hamid, Global Discipline Lead, Modern Workforce, Dell Technologies Consulting Services, said: With Microsoft Zero Trust. ”
The problem with the Zero Trust approach is that it requires tight integration with the IT environment it protects. That is why Dell is working with Microsoft to add Zero Trust principles to our services for identity and endpoint protection of systems operating within Microsoft environments.
Earlier in October, Dell announced its Zero Trust Cybersecurity Services and Zero Trust Center of Excellence, which uses a US Department of Defense-approved architecture. Today, Dell is adding to that by offering a suite of services that provide Dell + Microsoft customers with:
- Assessment of Active Directory and Azure Active Directory and other Microsoft items to discover existing cybersecurity status and generate recommendations.
- Defense with Microsoft’s Defender suite, integration with Microsoft’s Sentinel SIEM product, ServiceNow and similar services, plus Dell’s services to protect endpoints, MS 365 and Active Directory.
- User education to increase and maintain awareness of cybersecurity risks and to adopt better security postures.
- A managed service that provides incident detection and response for customers who want to outsource these functions.
One aspect of Zero Trust is that customer IT systems spend significant amounts of resources checking user and application resource demands. We can all recall antivirus products that slowed down our PCs due to continuous and lengthy checks performed on all data access and activity.
Hamid points out that the path to Zero Trust is different for every organization and that implementing this type of system architecture requires a complex path. Literally, if you take the attitude that data and resources are not accessible by default, you should validate all data and resources accessed by users and the applications they call. Virtually every user has a shadow security monitor (aka digital security guard) that watches everything they do and checks if it’s authorized.
[ad_2]
Source link