Access Management , Events , Governance & Risk Management

How Zero Trust Keeps Users, Applications and Data Protected

Paul Martini, iboss CEO, on How Zero Trust and Security Service Edge Work Together
Paul Martini, CEO, iboss

Businesses have embraced zero trust architectures in an effort to increase their protection while reducing cost and complexity for the organization, according to iboss CEO Paul Martini. Martini says companies are turning to zero trust to more effectively protect their users, applications and data.

See Also: Guiding Your Leadership Team Through the Zero Trust Mindset

In a video interview with Information Security Media Group at RSA Conference 2022, Martini also discusses:

  • How zero trust aligns with the NIST SP 800-207 standard;
  • How security service edge can deliver zero trust defense;
  • The potential for zero trust architecture to replace VPNs.

Martini holds more than 230 patents in cloud cybersecurity and is a trusted expert on zero trust, a modern cybersecurity architecture designed to prevent ransomware, breaches and data loss by making all applications private. He has been recognized for his leadership and innovation, receiving the Ernst & Young Entrepreneur of the Year award and being named one of Goldman Sachs' 100 Most Intriguing Entrepreneurs. Martini's work has been published in many scientific journals, including the Journal of Foundations in Computer Science and the Journal of Analytical Biochemistry.


About the Author

Michael Novinson

Michael Novinson

Managing Editor, Business, ISMG

Novinson is responsible for covering the vendor and technology landscape. Prior to joining ISMG, he spent four and a half years covering all the major cybersecurity vendors at CRN, with a focus on their programs and offerings for IT service providers. He was recognized for his breaking news coverage of the August 2019 coordinated ransomware attack against local governments in Texas as well as for his continued reporting around the SolarWinds hack in late 2020 and early 2021.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.