Security News > 2021 > September > Zero Trust Requires Cloud Data Security with Integrated Continuous Endpoint Risk Assessment

Zero Trust deployment - moving all your apps and data to the cloud and assuming no user or device is trustworthy until proven otherwise in order to gain access - has been rapidly introduced as a result of the pandemic.
Most attempts at achieving Zero Trust access today are a patchwork of disparate products from different vendors connected to virtual private networks, with rudimentary on-off access controls based on limited visibility.
Lookout's has announced its latest milestone - the expansion of Lookout Continuous Conditional Access by integrating security and access platforms.
To see this in action, register for Lookout's webinar on September 30th. Lookout will illustrate how integrating Mobile Endpoint Security, Cloud Access Security Broker and Zero Trust Network Access solutions to deliver a modern Zero Trust architecture.
By integrating security and access platforms, Lookout is able to extend CCA and provide a modern approach to Zero Trust.
That's the benefit of an integrated security and access platform, and that's the way Lookout believes a modern Zero Trust architecture should be designed.
News URL
Related news
- How to Bring Zero Trust to Wi-Fi Security with a Cloud-based Captive Portal? (source)
- Watch Out For These 8 Cloud Security Shifts in 2025 (source)
- How CISOs can balance security and business agility in the cloud (source)
- Balancing cloud security with performance and availability (source)
- Avoiding vendor lock-in when using managed cloud security services (source)
- Why multi-cloud security needs a fresh approach to stay resilient (source)
- Cloud security gains overshadowed by soaring storage fees (source)