Endpoint Security

The Impact of Zero Trust Networks on Cloud Transformation and Access

Naveen Palavalli, Vice President Product Strategy, Netskope on the rise of Zero Trust Networks
Naveen Palavalli, Vice President Of Product Strategy at Netskope

There has been a paradigm shift in the way organizations operate as a result of moving to the cloud which now increasingly hosts an enterprises’ business applications and data, with Palavalli noting Gartner figures suggest 70% of business applications will be cloud hosted by 2023.

When you add in hybrid working, accessing data from anywhere, avoiding sending data to centralized data centres which degrades user experience, while adding unnecessary cost and complexity – then the way sensitive data is protected has to change.

Secure seamless direct access to data is demanded, but the loss of traditional security controls mean that security has to follow the data wherever it goes, which is why organizations need to adopt a zero trust approach to data security.

In this video interview with Information Security Media Group Palavalli says:

  • VPNs no longer deliver the security needed by today’s enterprises;
  • Organizations need to evaluate how to re-architect their network to achieve Zero Trust;
  • Cloud based ZTNA can enable organizations to safely transform and scale their business operations more rapidly while reducing capital and operational expenditure.

Palavalli has 20+ years of leadership experience in product management and GTM roles, with a deep knowledge of SSE, endpoint, cloud, XDR, and network security technologies. He has an MBA from Kellogg School of Management and a MS in Computer Science from University of Southern California.


About the Author

Naveen Palavalli, Netskope

Naveen Palavalli, Netskope

Vice President of Product Strategy, Netskope

Naveen Palavalli is the Vice President of Product GTM strategy at Netskope. With 20+ years of leadership roles in product management and GTM, Naveen has deep knowledge of SSE, endpoint, cloud, XDR, and network security technologies.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.