Digital Transformation

CyberSecurity Mesh Architecture (CSMA)

CyberSecurity Mesh Architecture (CSMA)

The second of Gartner’s “Top 8 Cybersecurity Predictions for 2021-2022” relates to one of their highlighted “Top Strategic Technology Trends of 2022” — cybersecurity mesh, also known as cybersecurity mesh architecture (CSMA).

Gartner Prediction #2

By 2024, organizations adopting a cybersecurity mesh architecture will reduce the financial impact of security incidents by an average of 90%.

 

Who’s This Matter To?

The advent of decentralized technology and access affects all organizations today to some degree; however, cybersecurity mesh architecture will be especially important to organizations that fully embrace remote working. These organizations may also employ many third-party contractors or have a geographically dispersed workforce. In general, any organization in which the majority of work isn't organized into centralized, highly controlled units.
It's important that even companies that return to a mostly office-based office environment adopt CSMA because it's almost impossible to stop employees from working remotely on occasion or accessing data or applications (like email) from their personal devices or the company's mobile devices on an uncontrolled network.
 
 

 

What Businesses Need to Know

The concept of cybersecurity mesh builds on another popular trend in cybersecurity, Zero Trust. By introducing the principle of "don't trust, always verify," Zero Trust departed from the assumption that once a device or user is verified, it remains verified. In Zero Trust Network Access (ZTNA), verification takes place in every step - as well as with data, devices, applications, and users.
The cybersecurity mesh extends that approach to include all users, devices, networks, etc. regardless of location. As more employees work outside of traditional office networks either full time or occasionally, this is increasingly important. The concept of a traditional, controlled security perimeter no longer exists for the majority of businesses today. Those organizations that continue to use this old cybersecurity approach will face major problems. 

 

What Businesses Need to Do

Cybersecurity mesh is a fairly new term and there aren’t many solutions that specifically address it on the market yet. Businesses interested in working toward CSMA, however, should implement or mature their Zero Trust posture. There are many cases where ZTNA extends to outside use cases, bridging into the concept of cybersecurity mesh.
Within the next two years, organizations should adopt the concept of cybersecurity mesh by working to implement comprehensive solutions that specifically address verification and remote working situations. Implementing Zero Trust is a good start, but additional solutions are likely to emerge within the next 24 months as well.

Related Articles

 

Contact Us

CONTACT FOR ANY KIND OF INFORMATION

How can we help?

Get in touch with the prominent experts within Industry 4.0 and Digital Transformation!

Industry 4.0 is closely associated with more automation (compared to the Third Industrial Revolution), bridging the physical and digital worlds enabled by IIoT, Big Data, IoT, cloud computing, cognitive computing and smart factories.

Investing in innovative Industry 4.0 technologies has many advantages. It boosts collaboration between departments, increases efficiency, fuels growth as well as trims costs. Real-time data and intelligence, predictive analytics and IoT machinery helps companies be proactive when it comes to solving and addressing potential supply chain management and maintenance issues. In addition, it makes it easy to optimise and manage all aspects of manufacturing processes and supply chain.

 

 

Company

Digital Leaders provides top-notch Digital Transformation and Innovation Management services on-demand to lead your ongoing and future digital projects.

    Gramsci St., 13 Crispano, Italy
    +39 3316170662
    info@glweb.eu
    giuliano.liguori@pec.it 
    www.glweb.eu

Our Services

  • CIO as a Service
  • Digital Transformation
  • Innovation Management
  • Industry 4.0
  • Infosecurity
  • Data Protection & Privacy 
 

Let's Connect on Social Media

linkedin  iconfinder 5282544 camera instagram social media social network instagram logo icon 64px  twitter  Facebook

Follow Us to learn more!