
This report does not surprise me at all. End-user devices, whether managed or not, are the new IT perimeter, and with the paradigm shift to work from anywhere, both IT and security teams need to consider the added threat landscape, both at the software and firmware level of these devices. This is why implementing a Zero Trust Security model is crucial now and into the future. It’s not enough to just validate the end-users' credentials, you must evaluate the trust status of the devices as
.....Read More
The report does not surprise me at all. End-user devices, whether managed or not, are the new IT perimeter, and with the paradigm shift to work from anywhere, both IT and security teams "need to consider the added threat landscape, both at the software and firmware level of these devices. This is why implementing a Zero Trust Security model is crucial now and into the future. It’s not enough to just validate the end-users' credentials, you must evaluate the trust status of the devices as
.....Read More