Three Ways Machine Learning Is Revolutionizing Zero Trust Security
Bottom Line: Zero Trust Security (ZTS) starts with Next-Gen Access (NGA). Capitalizing on machine learning technology to enable NGA is essential in achieving user adoption, scalability, and agility in securing applications, devices, endpoints, and infrastructure. Zero Trust Security provides digital businesses with the security strategy they need to keep growing by scaling across each new perimeter and endpoint created as a result of growth. ZTS in the context of Next-Gen Access is built on four main pillars: (1) verify the user, (2) validate their device, (3) limit access and privilege, and (4) learn and adapt. The fourth pillar heavily relies on machine learning to discover risky user behavior and apply for conditional access without impacting user experience by looking for contextual and behavior patterns in access data.
May-11-2018, 16:01:37 GMT
- AI-Alerts:
- 2018 > 2018-05 > AAAI AI-Alert for May 15, 2018 (1.00)
- Industry:
- Information Technology > Security & Privacy (1.00)
- Technology: