Intelligent CIO Middle East Issue 55 | Page 67

HAMED DIAB, MENA, FORESCOUT Q + A + Q + A + Q + A + Q + A + Q + A + Q + A + Q + A + ther of IT and etworks is often y part of the rocess. Remote duction cycles, d, above all, quicker ype development uct are just some le this with the roduction processes nterconnected than umerous benefits, chnology can especially when y and fail-safety. ected devices is that ume of access points fore more potential tors. There are that detect dangers y fail because they on-going push hieve the most . In the worst-case defences’ can even s gain access to the freedom to perly segmented, creating blind exposed. Network can be dynamic. For Zero Trust approach “ IN ORDER TO ACHIEVE EFFECTIVE SECURITY, THE FULL CONTEXT OF CONNECTED DEVICES MUST BE AVAILABLE TO REGAIN BOTH VISIBILITY AND CONTROL. across all environments and to all devices, with different policies for the computer at the front desk and the CEO’s laptop, the risk posed by attacks is automatically limited. CISOs are having a difficult time in providing this security. Maintaining close control of their networks and device ecosystem continues to become more difficult as IoT and OT devices increase. In order to achieve effective security, the full context of connected devices must be available to regain both visibility and control. From the data centre to cloud and OT environments, devices can be given appropriate access rather than access to the entire network. www.intelligentcio.com