FINAL WORD
Manny Rivelo , CEO at Forcepoint it ’ s too risky . Neither can you clamp the irons on personal devices as doing so would effectively grind productivity to zero . Or worse , pushing folks to seek risky workarounds .
Manny Rivelo , CEO at Forcepoint
Manny Rivelo is the Chief Executive Officer ( CEO ) at Forcepoint . As Forcepoint CEO , Rivelo drives the company ’ s strategy to accelerate enterprise and government agency adoption of a modern approach to security that embraces the emerging Secure Access Service Edge ( SASE ) architecture .
devices ( USB , printers , Bluetooth , etc .). The promise of SASE and SSE is that everything works together to simplify how you implement Zero Trust for all of your users and business data .
Integrating SSE with inline data loss prevention ( DLP ) with advanced threat protection and other Zero Trust capabilities gives teams far greater control over how employees access and use that data . By following the credo of ‘ trust nothing , verify everything ,’ no intellectual property or regulated data can be shared or downloaded against policy and all content is sanitized from threats automatically , even on unmanaged devices or BYOD .
One policy can rule them all
This perimeter-less , Zero Trust universe will only exist if security policy can follow users and their devices . You can ’ t just turn everyone loose because
On the other hand , maintaining various policies for thousands of users and their devices , while accounting for the type of application or website being accessed , the location , network access and BYOD requirements , is a nightmare .
The biggest challenge in data security is the effort and time required to set up and dial in the policy – and to maintain that policy across multiple environments and devices .
Adopting data-first SASE , even if it ’ s done gradually , allows you to streamline processes and reduce spending on several individual point products . You can distribute enforcement by putting controls closer to the user using a combination of on-device agents for managed devices and agentless , reverse proxies for unmanaged devices .
The system is smart enough to make decisions wherever the user is located without having to route security traffic to a centralized data center , which increases wait time for the employee and infrastructure costs for IT security . You can authorize access and define enforcement policies just once .
This level of control over data usage extends to
BYOD for employees and also contractors and partners . By putting management in the cloud , the same set of security policies can continuously protect your people and stakeholders whether they work at home , in a branch office , or at a customer or partner site .
In the end , it ’ s about greater efficacy , ease of use , reduced cost and accelerated competitive advantages . If you focus too much on authentication and detection , you may be successful at knowing who a person is on the network and what they ’ re allowed to access . But you might not know what they ’ re accessing and why . Shifting to data-first SASE embraces a strategy of 100 % prevention to secure data wherever it ’ s used . It ’ s the fastest way to simplify security and make the single-vendor Zero Trust solution a reality . p
84 INTELLIGENTCIO NORTH AMERICA www . intelligentcio . com