How Legacy Tech Impedes Zero Trust and What To Do About It

Christine Owen of Guidehouse provides insights when enabling zero trust in a legacy tech environment.

As organizations embrace the zero-trust security model, legacy tech has created some roadblocks. In fact, replacing or rebuilding existing legacy infrastructures is the biggest challenge to implementing zero trust.

The zero-trust approach to enterprise cybersecurity eliminates that notion of implicit trust. In theory, that means the organization shouldn’t trust any user, device, or connection until it verifies itself as trustworthy. Zero trust believes all users, devices and software systems must establish trust through various mechanisms before connecting to the enterprise IT environment; zero trust also calls for all users, devices and software systems to re-establish that trust as they seek to access other networks and systems as well as enterprise data after gaining initial entry into the enterprise IT environment.

In this interview with Mary K. Pratt, Contributing Writer for CSO, Christine Owen of Guidehouse provides insights when enabling zero trust in a legacy tech environment.  

 
Read the Article

About the Experts

Back to top