Blog
Topic
All
AIoT
Products and technologies
Industries
All
Logistics
Building
Sustainability
Business trends
Cybersecurity
Events
Trends
Industry News
Company News
Product Announcement
Search blog
Blog
Filter
Cancel
All
AIoT
Products and technologies
Industries
All
Logistics
Building
Sustainability
Business trends
Cybersecurity
Events
Trends
Industry News
Company News
Product Announcement
Reset
Submit

Strengthen Cybersecurity against Vulnerabilities with a Zero Trust Network Model 

 

Hikvision on Zero Trust Network Architect to Address Vulnerabilities

 

One way to strengthen network cybersecurity and address vulnerabilities is with a Zero Trust model, covered in the Canadian Security magazine story, “Deploying a Zero Trust model to reinforce cybersecurity.”

From the article: “To the uninitiated, Zero Trust security is a contextual IT security model that operates on a simple mission statement: ‘Trust no one.’ This means that no user or device has default access to your organization’s network, workspace, or other assets. Your employees will need to pass security protocols before they are granted access. These protocols are based on a range of criteria like their identity, time of access, and device posture.”

Hikvision’s senior director of cybersecurity also provided an in-depth explanation of zero trust in this article from SecurityInfoWatch.com: “As a chief security officer charged with overseeing the physical security of an enterprise, who do you trust? Among those who are responsible for video surveillance, access control and the network these systems sit on, a trend is emerging. Increasingly, chief security officers trust no one. From a cybersecurity perspective, this is a sound approach. Trust No One. It’s worth noting that internal threats are a very real concern for enterprises. According to IBM, ‘Insider threats account for 60 percent of cyber-attacks, and they are incredibly difficult to detect.’”

The author of the Canadian Security article offers several steps to help organizations implement Zero Trust, including:

  • Conduct an audit of the organization’s network infrastructure.
  • Perform a threat assessment to determine potential network vulnerabilities.
  • Enable access for users based on what is needed on a day-to-day basis.
  • Once you’ve implemented a Zero Trust architecture, test it to ensure it stands up to potential threats.

Read more about Zero Trust in this Hikvision blog: “Study Finds Growth in Zero Trust Network Architecture Since Pandemic, Aims to Address Security Vulnerabilities & Concerns

Cybersecurity

Subscribe to newsletter

Subscribe to our email newsletter to get the latest, trending content from Hikvision

Hikvision.com uses strictly necessary cookies and related technologies to enable the website to function. With your consent, we would also like to use cookies to observe and analyse traffic levels and other metrics / show you targeted advertising / show you advertising on the basis of your location / tailor our website's content. For more information on cookie practices please refer to our cookie policy.

 

Contact Us
Hik-Partner Pro close
Hik-Partner Pro
Security Business Assistant. At Your Fingertips. Learn more
Hik-Partner Pro
Scan and download the app
Hik-Partner Pro
Hik-Partner Pro
back to top

Get a better browsing experience

You are using a web browser we don’t support. Please try one of the following options to have a better experience of our web content.