M&M security model crunched

Forrester pushes 'Zero Trust Model'

Speaking at the Attachmate Group's Brainshare Technology Forum in Sydney yesterday Forrester Research vice-president Dane Anderson said the M&M model of security – "hard on the outside and nice on the inside" – no longer works. Security professionals must now adopt a model of 'Zero Trust'.

In the Zero Trust Model, security professionals must assume that all traffic is threat traffic until it is verified that the traffic is authorised, inspected, and secured.

In the Zero Trust model Forrester says security professionals must verify and secure all resources regardless of location, limit and strictly enforce access control on a "need to know basis", inspect and log all network traffic and the network should be designed from the inside out.

Key to Zero Trust is a robust identity and access management (IAM) approach: Security professionals must plan for both outward and inward identity propagation, formalise and robustly protect the interfaces for IAM functions, and use and advocate standards for IAM interfaces.

Jeff Hawn, president and CEO of the Attachmate Group, said the world of IT is being redefined more rapidly now than in the past. End user expectations, such as BYOD, are challenging traditional IT practices and driving business to change as well.

Analyst firm Gartner predicts that Internet access using mobile devices will overtake PC in 2013, Hawn said, with 1.82 billion mobile device connecting to the Internet.

Novell president and GM, Bob Flynn, said the mobile user of today demands uncomplicated access to email, apps, print and files on any device, anywhere at any time.

Flynn said that more that 50 per cent of corporate travellers have sensitive company data with them while they are out of the office. In the US, 113 mobiles phones are lost or stolen every minute; nearly 12,000 laptops go missing every year.

Storing files in consumer-grade (free) cloud file stores is high risk because the IT lack visibility of the services and the means of managing them. Novell's new Filr product aims to address these risks by keeping files in the corporate data store but offering access to clients running iOS, Mac OS, Windows 7 and 8, or via a browser, Flynn said. User access controls are enforced and IT has the ability to manage this access.

Flynn also announced that Novell was close to shipping an iPrint appliance that leverages existing corporate printing infrastructure, Microsoft Active Directory or NetIQ eDirirectory and allows printing from mobile devices.

Join the newsletter!


Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

More about AttachmateForrester ResearchGartnerMicrosoftmobilesNetIQNetIQNovellTechnology

Show Comments