Moreover, that each enterprise environment is unique necessitates a lack of specific implementation details for zero trust, as compliance, geographies, verticals, and the nature of partners and others who need access to an organization’s systems can all vary wildly, in addition to on-prem, cloud, remote site, IoT, and legacy particulars.
“It’s a strategic transformation, not a tactical deployment, and that’s why we’re seeing such widespread struggle across the industry,” says Prashant Deo, the cybersecurity global practice head at Tata Consultancy Services. “Implementing zero trust at the enterprise level is an uphill taskwhich can require a phased and use case centric approach as part of the zero trust journey.”
Deo argues that the zero trust mindset is fundamentally at odds with how enterprises have always approached security.
