Security News > 2021 > August > Zero trust network access: A safe journey to a better employee experience
With zero trust network access, security software based on AI algorithms continuously monitors user and endpoint device behavior, checking for deviations from defined rules and historical behavior patterns.
The first step in zero trust network access is to continually verify the user's identity, ideally by applying multi-factor authentication via hardware tokens or soft-token apps.
For information security, users' access to resources can also be limited to what they need to access in their respective roles.
This is complemented by customizable rules that restrict user access based on their current context: user X is allowed access any kind of apps or data, from anywhere, with any device; user Y can only use email and the web remotely; and user Z may only access sensitive business intelligence data using two-factor authentication and a corporate device.
It is important to note that when implementing zero trust network access, organizations need to focus on employee experience.
Zero trust gives employees a safe journey through today's complex hybrid multi-cloud world and continuously establishes the trust needed for an efficient, secure work environment with a great employee experience.
News URL
http://feedproxy.google.com/~r/HelpNetSecurity/~3/_qnvFKuobX4/