Sean Berg, senior vice president and general manager for global governments and critical infrastructure at Forcepoint, has said that organizations should prioritize the monitoring of user perimeters through a zero-trust approach.
Berg wrote in a guest piece for FedScoop published Wednesday that an “inside-out” approach brings security controls closer to end-users as staff continues to work remotely.
He noted that agencies should consider deploying automated response and behavioral analytics tools to support continuous monitoring procedures that help address issues in zero-trust implementation.
Combining zero-trust procedures and continuous monitoring procedures enabled by behavioral analytics helps “personalize the security response on a case-by-case basis,” said Berg.
One-to-one security controls enacted in real-time are key to remote work activities as opposed to a one-size-fits-all or one-to-many approach, he added.
“With people as the new perimeter, zero trust is a non-negotiable first step for securing newly distributed agency workforces and ensuring users are who they say they are,” Berg said.
“These advanced technologies put controls dramatically closer to the user and allow agencies to react to threats in a fast, adaptive manner that doesn’t hinder connectivity or productivity.”