Close Menu
TechurzTechurz

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Mehrheit sieht Bedrohung durch hybride Angriffe

    October 16, 2025

    This Lenovo 2-in-1 is great for multitasking (and is over 50% off)

    October 16, 2025

    $15B Crypto Bust, Satellite Spying, Billion-Dollar Smishing, Android RATs & More

    October 16, 2025
    Facebook X (Twitter) Instagram
    Trending
    • Mehrheit sieht Bedrohung durch hybride Angriffe
    • This Lenovo 2-in-1 is great for multitasking (and is over 50% off)
    • $15B Crypto Bust, Satellite Spying, Billion-Dollar Smishing, Android RATs & More
    • I struggled to find earbuds that stay put, but this pair seals the deal
    • India’s Kuku snags $85M as mobile content wars intensify
    • MCPTotal Launches to Power Secure Enterprise MCP Workflows
    • These Bose earbuds are an easy pick over AirPods for me – why I don’t regret it
    • Over 100 VS Code Extensions Exposed Developers to Hidden Supply Chain Risks
    Facebook X (Twitter) Instagram Pinterest Vimeo
    TechurzTechurz
    • Home
    • AI
    • Apps
    • News
    • Guides
    • Opinion
    • Reviews
    • Security
    • Startups
    TechurzTechurz
    Home»Security»Game changer: How AI simplifies implementation of Zero Trust security objectives
    Security

    Game changer: How AI simplifies implementation of Zero Trust security objectives

    TechurzBy TechurzJuly 30, 2025No Comments4 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Game changer: How AI simplifies implementation of Zero Trust security objectives
    Share
    Facebook Twitter LinkedIn Pinterest Email


    As enterprises increasingly move workloads to private cloud for reasons such as performance and compliance and to leverage AI on-premises, security leaders face a critical challenge: implementing Zero Trust architecture at scale.

    While Zero Trust has become the gold standard for enterprise security, operationalizing it manually presents significant obstacles that AI can help overcome.

    Unlike perimeter-focused security models, Zero Trust for private cloud assumes no implicit trust and requires continuous verification of every transaction.

    A practical deployment of Zero Trust for applications requires a comprehensive understanding of the complex connections and dependencies between each asset in a constantly changing environment — and that’s just the starting point. Traditional tools have been engineered for perimeter security and have significant gaps in procuring data to understand these complex interactions of private cloud applications. Simply engaging in this first step with traditional tools is extremely cumbersome and costly.

    But does that mean the solution is to focus on protecting only critical apps with Zero Trust?

    Actually, no, according to Ranga Rajagopalan, CTO of the Application Networking and Security Division at Broadcom.

    “You may think, oh that’s good enough,” Rajagopalan said. “I’ll protect my critical apps through Zero Trust and not worry about non-critical apps. But that ‘partial Zero Trust’ approach won’t work. Modern attackers identify less-secure environments and systems, enter through them, and then move laterally toward high value assets. True Zero Trust demands that every application, every asset has the same level of cyber defense.”

    Zero Trust implementation in private cloud faces three primary challenges that often derail enterprise initiatives.

    Vendor complexity: Organizations typically require multiple specialized tools — firewalls, microsegmentation solutions, network detection, and response systems — from different vendors. This fragmented approach creates operational complexity with multiple APIs, operating systems, and management consoles that must be integrated and maintained.

    High costs: The high-volume app-to-app traffic in private cloud environments demands significant processing power from security tools. Traditional solutions become prohibitively expensive when scaled to handle comprehensive application-level traffic analysis.

    Data quality: Effective Zero Trust requires comprehensive, contextual data for high-fidelity threat detection. Operating in silos without integrated visibility across networking, computing, and storage systems severely limits detection capabilities.

    AI addresses these challenges by automating the complex, manual processes that make Zero Trust implementation daunting. AI can discover applications automatically, map communication patterns, detect anomalies, and generate security policies. AI is more effective when it has access to comprehensive data sets with contexts.

    Understanding “tribal” knowledge

    AI technology excels at understanding unique application behaviors that typically exist as undocumented tribal knowledge within organizations. By ingesting information about applications and performing automated forensics, AI can create appropriate security rules that are always validated and approved by humans prior to activation and enforcement.

    This automation reduces the inter-team dependencies that often create deployment bottlenecks. Instead of requiring extensive coordination between security, networking, and application teams, AI handles the bulk of the heavy lifting of assessing the environment, creating policies, and verifying their behavior for correctness.

    VMware vDefend exemplifies how AI can transform Zero Trust implementation in private cloud environments. The platform unifies multiple security functions into a single, integrated stack that’s natively integrated with private cloud infrastructure.

    vDefend’s AI capabilities enable rapid deployment and operationalization of Zero Trust for applications, reducing implementation timelines from months to days or weeks.

    The solution can scale to multi-terabit environments through software upgrades without additional licensing costs, thereby addressing the economic barriers that often limit Zero Trust scope in private cloud.

    Additionally, the platform’s integration with private cloud infrastructure enables organizations to protect their entire application environment rather than just critical systems, closing the security gaps that attackers exploit.

    Finally, by combining AI automation with self-service capabilities, vDefend allows development and operations teams to deploy new applications with security policies already in place, eliminating the traditional gap between compute deployment and security implementation that creates vulnerability windows.

    As enterprises continue their digital transformation journey, AI-powered Zero Trust solutions represent the most practical path to comprehensive security. AI transforms an otherwise complex, resource-intensive, multi-year initiative into a rapidly deployable and operationally scalable security strategy that can keep pace with an ever-evolving threat landscape.

    Learn more about how VMware vDefend can simplify and accelerate affordable Zero Trust implementation and management in private cloud.

    Umesh Mahajan, VP and GM, Application Networking and Security Division, Broadcom

    changer Game implementation objectives Security simplifies trust
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleRunloop lands $7M to power AI coding agents with cloud-based devboxes
    Next Article Gen AI apps doubled their revenue, grew to 1.7B downloads in first half of 2025
    Techurz
    • Website

    Related Posts

    Security

    Mehrheit sieht Bedrohung durch hybride Angriffe

    October 16, 2025
    Security

    This Lenovo 2-in-1 is great for multitasking (and is over 50% off)

    October 16, 2025
    Security

    $15B Crypto Bust, Satellite Spying, Billion-Dollar Smishing, Android RATs & More

    October 16, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    The Reason Murderbot’s Tone Feels Off

    May 14, 20259 Views

    Start Saving Now: An iPhone 17 Pro Price Hike Is Likely, Says New Report

    August 17, 20258 Views

    CNET’s Daily Tariff Price Tracker: I’m Keeping Tabs on Changes as Trump’s Trade Policies Shift

    May 27, 20258 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    The Reason Murderbot’s Tone Feels Off

    May 14, 20259 Views

    Start Saving Now: An iPhone 17 Pro Price Hike Is Likely, Says New Report

    August 17, 20258 Views

    CNET’s Daily Tariff Price Tracker: I’m Keeping Tabs on Changes as Trump’s Trade Policies Shift

    May 27, 20258 Views
    Our Picks

    Mehrheit sieht Bedrohung durch hybride Angriffe

    October 16, 2025

    This Lenovo 2-in-1 is great for multitasking (and is over 50% off)

    October 16, 2025

    $15B Crypto Bust, Satellite Spying, Billion-Dollar Smishing, Android RATs & More

    October 16, 2025

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer
    © 2025 techurz. Designed by Pro.

    Type above and press Enter to search. Press Esc to cancel.