IT and Business Insights for SMB Solution Providers

Zero-Trust IoT: Page 2 of 2

To keep corporate networks secure, implement a least-privilege, zero-trust approach with devices, not just users. By Martin Sinderman

“An organization that wants to implement ZT architecture needs to determine the scope of applicability for the use of ZT, and then spend all the time necessary to do thorough planning up front, before implementation,” says Herold, adding that “the more time spent planning, the less time will be spent fixing the areas overlooked when the ZT architecture was implemented.”

Meanwhile, there are a number of zero-trust network access (ZTNA) solutions utilizing artificial intelligence and machine learning that channel pros can implement for both IoT and the rest of their digital ecosystems. Examples include BlackBerry’s BlackBerry Gateway; Inferati’s Zero Trust AI; Vectra’s Cognito platform; Accenture XDR; and General Dynamics IT’s (GDIT) Cyber Stack.

To get up to speed on zero trust, Herold recommends NIST’s Zero Trust Architecture report.

“[The report] provides significant research and insights about ZT architecture that clients of MSPs will find helpful,” she notes, “and also will demonstrate to them that their MSPs are providing guidance based upon some of the most rigorous cybersecurity guidance available.”

Image: iStock

About the Author

Martin Sinderman is a freelance writer and frequent ChannelPro contributor in Savannah, Ga.

ChannelPro SMB Magazine
SUBSCRIBE FREE!

Get an edge on the competition

With each issue packed full of powerful news, reviews, analysis, and advice targeting IT channel professionals, ChannelPro-SMB will help you cultivate your SMB customers and run your business more profitably.