Vulnerability Management in the Age of Zero Trust – Join us for a Live Discussion
Share with Your Network
In my conversations with our customers here at Kenna, I’ve noticed a shift over the last two years. It can come up in a variety of ways, perhaps they’re using a public cloud to deploy VM agents to their application infrastructure, sometimes they’re implementing containers, and evaluating container security solutions, and increasingly, they have an endpoint protection solution that provides a vulnerability assessment capability and they’re interested in how it compares to their existing solution.
In each case, they’re interested in how it integrates with Kenna, and how they can get the data in. Even if they have coverage from a “traditional” vulnerability assessment or management solution, there’s often a desire to have overlapping (but de-duplicated) visibility – and it’s increasingly common that their architecture doesn’t make scanning from the outside easy, and they’re looking for options.
After thinking on this, I realized it’s not just the shift to cloud that’s driving this transition – or the success of the endpoint market, it’s more fundamental. While cloud (and really, the software defined perimeter) is accelerating the transition, it’s part of a larger shift. If you step back and look, each customer is in the process of a transition to a least-privilege-focused, application-oriented, zero trust network architecture.
Most organizations don’t have the development resources of an Akamai, and aren’t well suited to host their own worldwide authentication service. Not every enterprise can afford to run multiple networks in parallel as Google did, gradually moving employees to the new zero-trust network. No, few organizations have the resources and time of these Internet titans, but we can still glean helpful lessons from their experience, and use those to our advantage when moving to this model.
This Thursday – at 11 a.m. PT/2 p.m. ET – join me as we look at how successful organizations have made, or are in the middle of making this transition, and what we – as vulnerability management and proactive security professionals – can do to get ahead. We’ll discuss how you can use the zero trust initiative and increased emphasis on work from home to increase your vulnerability management capabilities, and dive into key technologies you’ll need to be familiar with as part of the transition.