Artificial Intelligence | News | Insights | AiThority
[bsfp-cryptocurrency style=”widget-18″ align=”marquee” columns=”6″ coins=”selected” coins-count=”6″ coins-selected=”BTC,ETH,XRP,LTC,EOS,ADA,XLM,NEO,LTC,EOS,XEM,DASH,USDT,BNB,QTUM,XVG,ONT,ZEC,STEEM” currency=”USD” title=”Cryptocurrency Widget” show_title=”0″ icon=”” scheme=”light” bs-show-desktop=”1″ bs-show-tablet=”1″ bs-show-phone=”1″ custom-css-class=”” custom-id=”” css=”.vc_custom_1523079266073{margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}”]

Lookout Security Solutions Selected For The NIST National Cybersecurity Center Of Excellence (NCCoE) Zero Trust Project

Endpoint-to-Cloud Security Provider to Help Close Zero Trust Gaps

Lookout Inc., an integrated endpoint-to-cloud security company, announced that it is collaborating with National Institute of Standards and Technology’s (NIST) National Cybersecurity Center of Excellence (NCCoE) in its “Implementing a Zero Trust Architecture” project.

Recommended AI News: VMware Cloud On AWS GovCloud (US) Achieves FedRAMP High Agency Authority To Operate

Zero Trust is a design approach to architecting an information technology environment that can reduce an organization’s risk exposure in a “perimeter-less” world. An organization must assume that no user or endpoint is trustworthy and assess their risk posture prior to providing access to applications and data. In addition, risk posture must be continuously reassessed to prevent data leaks and breaches.

The U.S. government’s exposure to cyberattacks has increased with its shift to telework, where endpoints, users and data are no longer inside the perimeter-based security of an agency. In May, President Biden signed an Executive Order 14028 requiring federal agencies to advance toward Zero Trust architecture. The Administration also issued a draft strategy directing agencies to secure software applications, limit access to network resources and keep network traffic hidden from unauthorized users.

Related Posts
1 of 40,547

Recommended AI News: Salesforce Achieves Net Zero Across Its Value Chain and 100% Renewable Energy

The goal of the NCCoE initiative is to demonstrate several approaches to a Zero Trust architecture that align with the principles documented in NIST SP 800-207, Zero Trust Architecture. It will also contribute to the NIST Cybersecurity Practice Guide, a detailed guide describing the steps to implement the Zero Trust architecture reference designs. Lookout is joined by 19 collaborators including Amazon Web Services, Cisco, F5 Networks, FireEye, IBM, McAfee, Microsoft, Okta, Palo Alto Networks, SailPoint Technologies, Symantec (Broadcom), Tenable and Zscaler.

Lookout delivers a Zero Trust solution that dynamically enforces security policies based on both the continuous risk assessment of endpoints and users, and the sensitivity of the data they are accessing. Lookout will enable federal agencies to align with Zero Trust pillars from the Cybersecurity and Infrastructure Security Agency (CISA):

  • Continuous assessment of device risk posture: Lookout continuously monitors the fluctuating risk posture of both agency issued and personal mobile endpoints, protecting agency data from device, application, network and phishing threats.
  • User behavior visibility: Lookout monitors user interactions with applications and data to detect anomalous behavior so agencies can stop account takeover-based attacks or insider threat.
  • Secure application workloads: Lookout dynamically enforces security policies based on data sensitivity as well as the continuous assessment of endpoint and user risk levels.
  • Understand and secure data at rest and in transit: Lookout dynamically classifies the sensitivity level of data across an entire agency’s infrastructure and ensures it isn’t shared with unauthorized users online or offline.
  • Secure network configurations: Lookout verifies the security posture of Software-as-a-Service (SaaS) applications, such as Box or Microsoft 365, and Infrastructure-as-a-Service (IaaS) environments such as AWS, Azure or GCP, to minimize risk of cyber attackers.

“With most of us continuing to work from anywhere, Zero Trust has become an imperative,” says Jim Dolce, CEO, Lookout. “Perimeter-based security cannot protect employees using devices and networks that federal agencies do not control. Our expertise in building an integrated Zero Trust solution will be invaluable in the development of the NIST NCCoE Zero Trust architectures and guidelines.”

Recommended AI News: Renesas Accelerates Deep Learning Development For ADAS And Automated Driving Applications

[To share your insights with us, please write to sghosh@martechseries.com ]

Comments are closed.