Everything is connected

The IP protocol has enabled anything and everything to be connected and thereby a part of a network, a business, a critical infrastructure, or a multitude of collaborations across borders and time-zones. If it is connected it can be reached. If it can be reached it can be hacked.

Legacy devices

There are more than 2 billion professional devices operational and connected in various ways. This number grows with more than 100 million new devices each year. The legacy remains a huge liability and a one that is not easily solved as most of these devices are wide open to malicious attacks

Perimeter trust

Current security structures tend to build upon a huge trust in the perimeter security. The backside of this is that when the perimeter is breached users and devices inside the network are exposed to attacks and wrongful use.

Transition from core to edge

The trend is clear, and computing, analysis, measurements, and communication moves from the core to the edge of the network. The security however remains network centric and static in most cases.

The threat from within

Up to 80% of cybercrime is committed from within the network. By employees, consultants, partners, customers, suppliers, collaboration members. This is why Zero Trust is key to any real security solution. For man and machine.