The digitization wave has helped the organizations to speed-up their growth in the competitive market scenario. But cybersecurity remains a key challenge for all of them in today’s time. CIOs and CTOs are keep on scaling their solutions to find right approach to secure their IT infrastructure from any kind of cyber threats. But in the hybrid work culture, this has become more challenging than ever. Zero Trust model is one of the finest ways to secure the sensitive data amidst sharply increasing cyber incidents. Rajeev Ranjan, Editor, Digital Terminal recently interacted with Ram Vaidyanathan, Cybersecurity Evangelist, ManageEngine to gain the in-depth knowledge about the cybersecurity scenario, how organizations can combat against the potential threats, growth plans and much more. Read below the excerpts-
Rajeev: How do you see the increase in the number of cybercrimes in a hybrid work environment? What is the key reason for the rise in such incidences?
Ram: I am not surprised by the increase in cybercrime that we see around the world. This is because:
Organisations have traditionally used VPNs to authenticate users. But VPNs do not provide the necessary continuous authentication and authorisation.
Rajeev: Organizations are rapidly migrating to cloud in order to manage the operations more efficiently so what are the key challenges that organizations face in this journey?
Ram: As per recent findings, the hybrid work model has forced organisations to adopt new technologies like cloud computing at an increased pace, fuelling 20% growth in the use of cloud services in 2021 compared to only 6% growth in 2020. However, security has not kept up with all of this digital transformation.
Migrating systems to an efficient hybrid cloud will never be a simple process. The following are some of the key challenges companies face during the rapid transition to the cloud:
Rajeev: How can organizations secure their IT infrastructure with Zero Trust?
Ram: Zero Trust is a security standard based on the principle of “never trust, always verify.” It ensures that no user or device is trusted, regardless of whether they are inside or outside the organisation’s network. Simply put, the Zero Trust model eliminates the practice of trusting anything within an organisation’s security perimeter and instead advocates for stringent identity verification policies to grant access to users both inside and outside the perimeter.
Zero Trust helps secure organisations' sensitive data through:
Rajeev: What is your current channel strength? Please name your key partners. How are you planning to enhance your partner network?
Ram: We have a strong network of over 200 partners globally. Our partners help us better connect with our customers and ensure stability. So every partner relationship matters to us, and we do our best to nurture it. We provide technical and techno-commercial training for our partners periodically, during which we bring them up to date on the latest features of our products to help them serve customers better. We also co-brand with them to enhance their visibility in the market. We already have an excellent partner network across the globe, so we are constantly approached for partnering.
Rajeev: What are your expansion plans for the FY 2022-23? What is your targeted revenue/market share for the period?
Ram: Exposing our products and services to a broader audience is our primary goal. We prioritise investing in product design and integration so that our customers can accelerate their own digital transformation. Currently, our main markets are the United States and the United Kingdom, but we have plans to explore new markets and reach out to new groups of people across the globe.