{"id":23038,"date":"2023-10-03T08:30:15","date_gmt":"2023-10-03T16:30:15","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2023\/10\/03\/news-16768\/"},"modified":"2023-10-03T08:30:15","modified_gmt":"2023-10-03T16:30:15","slug":"news-16768","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2023\/10\/03\/news-16768\/","title":{"rendered":"Zero trust and why it matters to the Apple enterprise"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/idge\/imported\/imageapi\/2023\/09\/18\/15\/amazon-box-apple-logo-100946077-small.jpg\"\/><\/p>\n<p>Once upon a time, digital business sat inside the security perimeter. Devices were kept in offices, shared the same network, and were protected by antivirus software, firewalls, and software updates. This system wasn\u2019t perfect and became increasingly specialized, with security teams, networking teams, and others all working in different sectors.<\/p>\n<p>With mobility, this changed. Devices were <a href=\"https:\/\/www.computerworld.com\/article\/3705988\/with-byod-comes-responsibility-and-many-firms-arent-delivering.html\">unleashed from their locations<\/a>, used their own networks, and stood outside of traditional corporate endpoint protection.<\/p>\n<p>The pandemic accelerated these changes, fostering the evolution of innovative security protections outside of traditional perimeters, such as <a href=\"https:\/\/www.computerworld.com\/article\/3707792\/jnuc-2023-the-top-5-changes-jamf-unveiled.html\">around zero-trust<\/a>. The global zero trust security market is now expected to reach <a href=\"https:\/\/www.globenewswire.com\/news-release\/2023\/09\/27\/2750606\/0\/en\/Global-Zero-Trust-Security-Market-Size-Targets-USD-99-17-Billion-by-2030-with-a-17-50-CAGR-Growing-Adoption-for-Endpoint-Security.html\" rel=\"nofollow noopener\" target=\"_blank\">$99 billion by 2030<\/a>, up from $23 billion in 2021.<\/p>\n<p>Definitions differ, but verification is critical to how this security model works. That means that everyone \u2014 every location, every user, every device, even every app \u2014 is blocked from access to enterprise assets and services until they can prove they should have such access.<\/p>\n<p>The philosophy is that breaches are inevitable and that threats can come from anywhere, including within the network.\u00a0The National Institute of Standards and Technology (NIST), part of the US Department of Commerce, <a href=\"https:\/\/csrc.nist.gov\/publications\/detail\/sp\/800-207\/final\" rel=\"nofollow noopener\" target=\"_blank\">explains it this way<\/a>: \u201cZero trust refers to an evolving set of cybersecurity paradigms that move defenses from static, network-based perimeters to focus on users, assets, and resources.\u201d\u00a0<\/p>\n<p>When used alongside device management services such as <a href=\"https:\/\/www.computerworld.com\/article\/3618415\/jamf-adds-zero-trust-security-to-the-apple-enterprise.html\">Jamf<\/a>, <a href=\"https:\/\/www.businesswire.com\/news\/home\/20230918281021\/en\/Mosyle-Unveils-First-AI-Powered-Zero-Trust-Security-for-macOS\" rel=\"nofollow noopener\" target=\"_blank\">Mosyle<\/a>, <a href=\"https:\/\/blog.kandji.io\/zero-trust-security\" rel=\"nofollow noopener\" target=\"_blank\">Kandji<\/a>, and others, additional factors, including location, device-specific data, and may also come into play to further secure the device and its communications. The idea is that even as the number of potential security vulnerabilities increases, the core protection on the device \u2014 the zero trust protection \u2014 brings a layer of authentication and oversight to protect interactions in the first place, and to speed up response when things go wrong.<\/p>\n<p>That\u2019s zero trust, or at least what it attempts to deliver. It\u2019s also <a href=\"https:\/\/www.realcleardefense.com\/articles\/2023\/09\/20\/growing_cyber_threats_require_us_allies_to_implement_a_zero_trust_strategy_980709.html\" rel=\"nofollow noopener\" target=\"_blank\">going to become mandatory<\/a> across digital business in the years to come.<\/p>\n<p>That\u2019s a simplification of a compound of complementary technologies, of course, but the end game should be that no matter what devices your employees use, what apps they employ, and where they are accessing your networks from, you can be fairly certain access is legitimate. Your SaaS applications and company data remain secured no matter where or how your people access it.<\/p>\n<p>Apple\u2019s <a href=\"https:\/\/www.computerworld.com\/article\/3705669\/idc-sees-big-enterprise-shift-to-macs-over-next-12-months.html\">fast-growing position in the enterprise<\/a> is a huge opportunity for Apple admins. They come to the space relatively less encumbered by the traditional silo-based approach to security and have the advantage that most key Apple device management systems already support the superior security magic that is zero trust.<\/p>\n<p>Because they aren\u2019t constrained by an old approach, Apple techs have the opportunity to define the new one \u2014 and because the user experience they can then provide is more integrated and more approachable to users, the experience of using zero trust on Apple devices is actually better than on Windows.<\/p>\n<p>That\u2019s something that seems to be happening, according to Jamf VP portfolio strategy, Michael Covington, <a href=\"https:\/\/www.computerworld.com\/article\/3707354\/jamf-exec-details-how-the-apple-ecosystem-will-win-the-business-market.html\">who told me<\/a>:<\/p>\n<p>\u201cMacs \u2014 and especially iPads and iPhones \u2014 they are now getting line-of-business application access. And you&#8217;re able to deliver not only those tools to end users on these devices, but to do it in a way that actually the experience is better than it is on a Windows device. That is a really compelling play for more workers, especially in choice organizations, to say, &#8220;Hey, I want a Mac,&#8221; or &#8220;I want an iPad,&#8221; or whatever it might be.\u201d<\/p>\n<p>In other words, Apple admins have a chance to make more work for themselves by giving employees across their organizations new reasons to upgrade to Macs, iPads, or iPhones.<\/p>\n<p>Covington also noted that switching to zero trust security models remains challenging to some businesses, even to larger entities that already have zero trust schemes in place.<\/p>\n<p>One of the challenges is to get the data out of the traditional organizational silos (such as security, mobile, Mac, compliance) that have grown over time. That\u2019s difficult for some organizations, but easier to accomplish with Apple because silos aren\u2019t set and existing device management technologies already support zero trust, or at least trusted access models.<\/p>\n<p>It means Apple IT can deliver more security wrapped inside positive user experiences, while also ensuring devices are complaint and meet security standards. That\u2019s good for the company, of course, but also good for the admin, who can use the success of their deployments to argue for additional responsibility and oversight to help erode traditional silos to support future focused security protection.<\/p>\n<p>Zero trust is complex. It\u2019s not just a sequence of complementing security technologies; it also represents a changing approach to achieving digital business stability. But for Apple admins, the implementation of these models is a chance to deliver both highly secure computing environments and industry-leading ease of use, <a href=\"https:\/\/www.computerworld.com\/article\/3707329\/cisco-macs-in-business-boost-productivity-and-security-cuts-costs.html\">within budgets, at a lower TCO<\/a>. No wonder <a href=\"https:\/\/www.computerworld.com\/article\/3705613\/three-quarters-of-large-us-firms-now-using-more-apple-devices-survey.html\">Apple adoption is accelerating<\/a>.<\/p>\n<p><em>Please follow me on\u00a0<a href=\"https:\/\/social.vivaldi.net\/@jonnyevans\" rel=\"nofollow noopener\" target=\"_blank\">Mastodon<\/a>, or join me in the\u00a0<a href=\"https:\/\/mewe.com\/join\/appleholics_bar_and_grill\" rel=\"nofollow noopener\" target=\"_blank\">AppleHolic\u2019s bar &amp; grill<\/a>\u00a0and\u00a0<a href=\"https:\/\/mewe.com\/join\/apple_discussions\" rel=\"nofollow noopener\" target=\"_blank\">Apple\u00a0Discussions<\/a>\u00a0groups on MeWe.<\/em><\/p>\n<p><a href=\"https:\/\/www.computerworld.com\/article\/3707712\/why-zero-trust-matters-to-apple-enterprise.html#tk.rss_security\" target=\"bwo\" >http:\/\/www.computerworld.com\/category\/security\/index.rss<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/idge\/imported\/imageapi\/2023\/09\/18\/15\/amazon-box-apple-logo-100946077-small.jpg\"\/><\/p>\n<article>\n<section class=\"page\">\n<p>Once upon a time, digital business sat inside the security perimeter. Devices were kept in offices, shared the same network, and were protected by antivirus software, firewalls, and software updates. This system wasn\u2019t perfect and became increasingly specialized, with security teams, networking teams, and others all working in different sectors.<\/p>\n<p>With mobility, this changed. Devices were <a href=\"https:\/\/www.computerworld.com\/article\/3705988\/with-byod-comes-responsibility-and-many-firms-arent-delivering.html\">unleashed from their locations<\/a>, used their own networks, and stood outside of traditional corporate endpoint protection.<\/p>\n<p>The pandemic accelerated these changes, fostering the evolution of innovative security protections outside of traditional perimeters, such as <a href=\"https:\/\/www.computerworld.com\/article\/3707792\/jnuc-2023-the-top-5-changes-jamf-unveiled.html\">around zero-trust<\/a>. The global zero trust security market is now expected to reach <a href=\"https:\/\/www.globenewswire.com\/news-release\/2023\/09\/27\/2750606\/0\/en\/Global-Zero-Trust-Security-Market-Size-Targets-USD-99-17-Billion-by-2030-with-a-17-50-CAGR-Growing-Adoption-for-Endpoint-Security.html\" rel=\"nofollow noopener\" target=\"_blank\">$99 billion by 2030<\/a>, up from $23 billion in 2021.<\/p>\n<p class=\"jumpTag\"><a href=\"\/article\/3707712\/why-zero-trust-matters-to-apple-enterprise.html#jump\">To read this article in full, please click here<\/a><\/p>\n<\/section>\n<\/article>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[11062,10643],"tags":[2211,11270,10554,714,24580],"class_list":["post-23038","post","type-post","status-publish","format-standard","hentry","category-computerworld","category-independent","tag-apple","tag-it-management","tag-mobile","tag-security","tag-small-and-medium-business"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/23038","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=23038"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/23038\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=23038"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=23038"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=23038"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}