Close Menu
TechurzTechurz

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Rune Elmqvist: Inkjet Printers, Implantable Pacemakers

    August 29, 2025

    Why CEOs Should Incentivize Employees To Replace Themselves With AI

    August 29, 2025

    9 Dinge, die CISOs den Job kosten

    August 29, 2025
    Facebook X (Twitter) Instagram
    Trending
    • Rune Elmqvist: Inkjet Printers, Implantable Pacemakers
    • Why CEOs Should Incentivize Employees To Replace Themselves With AI
    • 9 Dinge, die CISOs den Job kosten
    • From pilot to scale: Making agentic AI work in health care
    • Microsoft AI launches its first in-house models
    • Samsung offers enticing preorder deal for new Galaxy tablets ahead of September Unpacked
    • Nvidia CEO: Some Jobs Will Disappear As AI Advances
    • Google’s new Pixel phone insurance includes unlimited claims, but is it legit? I did the math
    Facebook X (Twitter) Instagram Pinterest Vimeo
    TechurzTechurz
    • Home
    • AI
    • Apps
    • News
    • Guides
    • Opinion
    • Reviews
    • Security
    • Startups
    TechurzTechurz
    Home»Security»Game changer: How AI simplifies implementation of Zero Trust security objectives
    Security

    Game changer: How AI simplifies implementation of Zero Trust security objectives

    TechurzBy TechurzJuly 30, 2025No Comments4 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Game changer: How AI simplifies implementation of Zero Trust security objectives
    Share
    Facebook Twitter LinkedIn Pinterest Email


    As enterprises increasingly move workloads to private cloud for reasons such as performance and compliance and to leverage AI on-premises, security leaders face a critical challenge: implementing Zero Trust architecture at scale.

    While Zero Trust has become the gold standard for enterprise security, operationalizing it manually presents significant obstacles that AI can help overcome.

    Unlike perimeter-focused security models, Zero Trust for private cloud assumes no implicit trust and requires continuous verification of every transaction.

    A practical deployment of Zero Trust for applications requires a comprehensive understanding of the complex connections and dependencies between each asset in a constantly changing environment — and that’s just the starting point. Traditional tools have been engineered for perimeter security and have significant gaps in procuring data to understand these complex interactions of private cloud applications. Simply engaging in this first step with traditional tools is extremely cumbersome and costly.

    But does that mean the solution is to focus on protecting only critical apps with Zero Trust?

    Actually, no, according to Ranga Rajagopalan, CTO of the Application Networking and Security Division at Broadcom.

    “You may think, oh that’s good enough,” Rajagopalan said. “I’ll protect my critical apps through Zero Trust and not worry about non-critical apps. But that ‘partial Zero Trust’ approach won’t work. Modern attackers identify less-secure environments and systems, enter through them, and then move laterally toward high value assets. True Zero Trust demands that every application, every asset has the same level of cyber defense.”

    Zero Trust implementation in private cloud faces three primary challenges that often derail enterprise initiatives.

    Vendor complexity: Organizations typically require multiple specialized tools — firewalls, microsegmentation solutions, network detection, and response systems — from different vendors. This fragmented approach creates operational complexity with multiple APIs, operating systems, and management consoles that must be integrated and maintained.

    High costs: The high-volume app-to-app traffic in private cloud environments demands significant processing power from security tools. Traditional solutions become prohibitively expensive when scaled to handle comprehensive application-level traffic analysis.

    Data quality: Effective Zero Trust requires comprehensive, contextual data for high-fidelity threat detection. Operating in silos without integrated visibility across networking, computing, and storage systems severely limits detection capabilities.

    AI addresses these challenges by automating the complex, manual processes that make Zero Trust implementation daunting. AI can discover applications automatically, map communication patterns, detect anomalies, and generate security policies. AI is more effective when it has access to comprehensive data sets with contexts.

    Understanding “tribal” knowledge

    AI technology excels at understanding unique application behaviors that typically exist as undocumented tribal knowledge within organizations. By ingesting information about applications and performing automated forensics, AI can create appropriate security rules that are always validated and approved by humans prior to activation and enforcement.

    This automation reduces the inter-team dependencies that often create deployment bottlenecks. Instead of requiring extensive coordination between security, networking, and application teams, AI handles the bulk of the heavy lifting of assessing the environment, creating policies, and verifying their behavior for correctness.

    VMware vDefend exemplifies how AI can transform Zero Trust implementation in private cloud environments. The platform unifies multiple security functions into a single, integrated stack that’s natively integrated with private cloud infrastructure.

    vDefend’s AI capabilities enable rapid deployment and operationalization of Zero Trust for applications, reducing implementation timelines from months to days or weeks.

    The solution can scale to multi-terabit environments through software upgrades without additional licensing costs, thereby addressing the economic barriers that often limit Zero Trust scope in private cloud.

    Additionally, the platform’s integration with private cloud infrastructure enables organizations to protect their entire application environment rather than just critical systems, closing the security gaps that attackers exploit.

    Finally, by combining AI automation with self-service capabilities, vDefend allows development and operations teams to deploy new applications with security policies already in place, eliminating the traditional gap between compute deployment and security implementation that creates vulnerability windows.

    As enterprises continue their digital transformation journey, AI-powered Zero Trust solutions represent the most practical path to comprehensive security. AI transforms an otherwise complex, resource-intensive, multi-year initiative into a rapidly deployable and operationally scalable security strategy that can keep pace with an ever-evolving threat landscape.

    Learn more about how VMware vDefend can simplify and accelerate affordable Zero Trust implementation and management in private cloud.

    Umesh Mahajan, VP and GM, Application Networking and Security Division, Broadcom

    changer Game implementation objectives Security simplifies trust
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleRunloop lands $7M to power AI coding agents with cloud-based devboxes
    Next Article Gen AI apps doubled their revenue, grew to 1.7B downloads in first half of 2025
    Techurz
    • Website

    Related Posts

    Security

    9 Dinge, die CISOs den Job kosten

    August 29, 2025
    Security

    Samsung offers enticing preorder deal for new Galaxy tablets ahead of September Unpacked

    August 29, 2025
    Security

    Salt Typhoon APT techniques revealed in new report

    August 29, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    Start Saving Now: An iPhone 17 Pro Price Hike Is Likely, Says New Report

    August 17, 20258 Views

    You Can Now Get Starlink for $15-Per-Month in New York, but There’s a Catch

    July 11, 20257 Views

    Non-US businesses want to cut back on using US cloud systems

    June 2, 20257 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    Start Saving Now: An iPhone 17 Pro Price Hike Is Likely, Says New Report

    August 17, 20258 Views

    You Can Now Get Starlink for $15-Per-Month in New York, but There’s a Catch

    July 11, 20257 Views

    Non-US businesses want to cut back on using US cloud systems

    June 2, 20257 Views
    Our Picks

    Rune Elmqvist: Inkjet Printers, Implantable Pacemakers

    August 29, 2025

    Why CEOs Should Incentivize Employees To Replace Themselves With AI

    August 29, 2025

    9 Dinge, die CISOs den Job kosten

    August 29, 2025

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer
    © 2025 techurz. Designed by Pro.

    Type above and press Enter to search. Press Esc to cancel.