In order for the adaptive security infrastructure in your environment to be effective, edge security controls need to move beyond prescriptive risk policies and leverage deeper request context and behavior analysis. As best practices suggest, using a hybrid approach where prescriptive access policies are enforced by default but are given less weight individually as behavioral information for a specific user is the most effective. To accommodate diverse scenarios, organizations typically require a mix of strong and passive authentication methods. This enables you to apply the best fit based on the specific need and the associated risk (i.e., how sensitive the information is and the context of the request).
Micro Focus welcomes the opportunity to join your zero trust team and help you expedite a smooth transition to ZTA, meet existing mandate deadlines, and apply more effective security operations.
Format: |
|
Topics: | |
Website: | Visit Publisher Website |
Publisher: | Micro Focus Government Solutions |
Published: | March 8, 2022 |
License: | Copyrighted |
Copyright: | © 2022. Micro Focus. All Rights Reserved. |