<?xml version="1.0" encoding="UTF-8" ?><!-- generator=Zoho Sites --><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><atom:link href="https://www.cloud9advisers.com/News/tag/zero-trust/feed" rel="self" type="application/rss+xml"/><title>Cloud 9 Advisers - News #zero trust</title><description>Cloud 9 Advisers - News #zero trust</description><link>https://www.cloud9advisers.com/News/tag/zero-trust</link><lastBuildDate>Wed, 25 Feb 2026 18:38:28 -0800</lastBuildDate><generator>http://zoho.com/sites/</generator><item><title><![CDATA[Never Trust and Always Verify]]></title><link>https://www.cloud9advisers.com/News/post/never-trust-and-always-verify</link><description><![CDATA[Never Trust and Always Verify. Hmm, doesn't sound very productive in most business situations, but if you're talking about technology and security, I think we might be on to something.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_TAHtRM7MTwyz93DQF4vulQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_EK0C27GDQIeK-T7DwhG40g" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_1wDa-H2ITMKidvNyBIDVAg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_6xmd7dxZROuVXa4jR6sTrg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_6xmd7dxZROuVXa4jR6sTrg"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true">Zero Trust Picking up Steam in the Enterprise</h2></div>
<div data-element-id="elm_MurS2mZbgH6qIQkLiZMx9g" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_MurS2mZbgH6qIQkLiZMx9g"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="size-original" data-size-mobile="size-original" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20images/ZeroTrustSecurity.png" size="original" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_3MYoUag1of7CYIZHqfMTrA" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_3MYoUag1of7CYIZHqfMTrA"].zprow{ border-radius:1px; } </style><div data-element-id="elm_KX-DnESpwPeszGZSn0xybQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_KX-DnESpwPeszGZSn0xybQ"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_gmq_CGqL3txZQszRpkTkTg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_gmq_CGqL3txZQszRpkTkTg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p style="font-size:16px;">Never Trust and Always Verify. Hmm, doesn't sound very productive in most business situations, but if you're talking about technology and security, I think we might be on to something. </p><p style="font-size:16px;"><br></p><p style="font-size:16px;"><span style="color:inherit;">&quot;The traditional perimeter-based security model is dead. It has been overtaken by an era of cloud, mobility, and BYOD that requires a new approach to network access control.&quot;</span><br></p><p style="font-size:16px;"><br></p><p style="font-size:16px;"><span style="color:inherit;">The Zero Trust Network Access (ZTNA) model is a new method of access control that considers all network connections untrusted. This is a shift from the traditional concept of an inside/outside network where only some connections were considered trusted. The ZTNA model requires organizations to consider all traffic as potential threats, which means security controls must be in place at every stage of the attack lifecycle and beyond the firewall layer into your environment.</span><br></p><p style="font-size:16px;"><br></p><p style="font-size:16px;"><span style="color:inherit;">Never Trust and Always Verify</span>&nbsp;is the general premise behind Zero Trust Network Access (ZTNA). A strong proponent for the replacement of traditional remote access like Virtual Private Networking (VPN), where a secure tunnel straight into the corporate network is created and anything that goes through that tunnel is presumed &quot;safe&quot; and &quot;trusted&quot;. There are a number of &quot;faith-based&quot; assumptions that take place when using&nbsp; VPN. One big one being the remote device creating the tunnel is <span style="font-style:italic;">still</span>&nbsp;a trusted device. ZTNA takes a different approach: nothing is trusted and everything must be verified. This might seem laborious, but the user experience is minimally affected and security benefits are significant.</p><p style="font-size:16px;"><br></p><p style="font-size:16px;">ZTNA is starting to turn heads with IT for its protection of applications, data, and networks, easier control, and innate simplicity allowing access to remote staff, suppliers, and contractors. Some providers offer client and clientless versions for far greater flexibility and no need to constantly update Active Directory just to let a supplier in for two hours worth of work. And even provided secure access to users' personal devices without the typically required &quot;big brother'&quot;intrusions.&nbsp;</p><p style="font-size:16px;"><br></p><p style="font-size:16px;">The real power of ZTNA comes when its combined with the power of a Secure Access Service Edge (SASE) solution. These two put together forms a full security barrier and flexible perimeter thoroughly protecting endpoints and users.&nbsp;</p><p style="font-size:16px;"><br></p><p style="font-size:16px;">Using disparate/separate SASE and ZTNA platforms can certainly be done, but should only be done so by the most adept and experience security professionals. The management interface and integration of these separated systems is highly complex. Many solutions exist&nbsp; that combine both SASE and ZTNA together with a single management interface. Some providers also offer a completely managed solutions as well.&nbsp;</p><p style="font-size:16px;"><br></p><p><span style="color:inherit;"></span></p><p style="font-size:16px;">Regardless there is a lot to consider. Contact us and we'll get you in contact with a Strategic Tech Expert to wal you through all of the options and find out who the best vendors are for your business</p></div>
</div></div><div data-element-id="elm_PcKNyCs_ulmjRBw_z99Axw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_PcKNyCs_ulmjRBw_z99Axw"].zpelem-col{ border-radius:1px; } </style></div>
</div><div data-element-id="elm_iS6O_iNXLx1VEelRIBau9w" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_iS6O_iNXLx1VEelRIBau9w"].zpelem-divider{ border-radius:1px; } </style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_XnQzp6JOozkRcfrmluvmQQ" data-element-type="imageheadingtext" class="zpelement zpelem-imageheadingtext "><style> [data-element-id="elm_XnQzp6JOozkRcfrmluvmQQ"].zpelem-imageheadingtext{ border-radius:1px; } </style><div data-size-tablet="size-original" data-size-mobile="size-original" data-align="right" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimageheadingtext-container zpimage-with-text-container zpimage-align-right zpimage-size-medium zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/C9-Logo1.t-all.png" data-src="/C9-Logo1.t-all.png" size="medium" data-lightbox="true" style="height:140px;width:271.85px;"/></picture></span></figure><div class="zpimage-headingtext-container"><h3 class="zpimage-heading zpimage-text-align-left " data-editor="true">About Cloud 9 Advisers</h3><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div>Cloud 9 Advisers helps business leaders and understaffed IT teams that need a strategic partner, not just another vendor. We help decision-makers buy great technology. We work with you to rationalize and reduce technology spending without sacrificing the technology itself and employ sound digital transformation principles and strategies.</div><p><span style="color:inherit;"><br></span></p><div>We do not sell solutions, we help you buy the right solutions. We are not a vendor, we help you find the right vendors. We diagnose problems, prescribe solutions, and facilitate decisions.</div><p><span style="color:inherit;"><br></span></p><div>We are impartial, unbiased, and vendor-neutral technology practitioners with expertise in four critical segments: Cybersecurity, Communications, Connectivity, and Cloud. Our proprietary software contains decades of data and analytics on all of the 250+ vendors in our Supplier Portfolio. We’ll help you quickly identify, research, evaluate, and compare appropriate solutions and vendors; eliminating months of labor trying to do it on your own. We’ll help you make confident decisions quickly.&nbsp;</div><p><span style="color:inherit;"><br></span></p><div>To learn more contact us today and book an appointment.</div><p><span style="color:inherit;"><br></span></p><div><br></div></div>
</div></div></div><div data-element-id="elm_80PupHh1TDWfZ5tzNRuEVw" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_80PupHh1TDWfZ5tzNRuEVw"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="/contact-us"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Tue, 16 Mar 2021 17:11:26 -0500</pubDate></item><item><title><![CDATA[Supplier Spotlight: RSI]]></title><link>https://www.cloud9advisers.com/News/post/supplier-spotlight-RSI</link><description><![CDATA[While a lot of our clients’ attention is focused on our unique Automated Cyber Risk Management solution, powered by CyberCompass, we also assist our forward-thinking clients to achieve Zero Trust Security through the adoption of our ‘Evolving Trust’ Framework.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_nQZIJH5QQIOFPDSbUUlrgQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_wi_QXZ1PTa-ALmp5S7YmIw" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_SOmJiVcYR56mXJZ10lVcxg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_SOmJiVcYR56mXJZ10lVcxg"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_A3lLyquuTRKFRclfPBbYuQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_A3lLyquuTRKFRclfPBbYuQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;">Getting Zero Trust Right</span></h2></div>
<div data-element-id="elm_DUwACMZgs7NyNSthLBaS3A" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_DUwACMZgs7NyNSthLBaS3A"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="https://images.unsplash.com/photo-1575018101372-580b21aab4d2?ixlib=rb-1.2.1&amp;q=80&amp;fm=jpg&amp;crop=entropy&amp;cs=tinysrgb&amp;w=1080&amp;fit=max&amp;ixid=eyJhcHBfaWQiOjQ1Nzk3fQ" size="original" alt="Cloud 9 Zero Trust Security RSI" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_82qGMR4fTB-GccTIs6PXzg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_82qGMR4fTB-GccTIs6PXzg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><p><span style="font-size:12px;">By: Taylor Hersom, RSI, see the original article here&nbsp;<a href="https://www.rsitex.com/post/getting-zero-trust-right" title="RSItex.com/post/getting-zero-trust-right" target="_blank">RSItex.</a><a href="https://www.rsitex.com/post/getting-zero-trust-right" title="RSItex.com/post/getting-zero-trust-right" target="_blank">com/post/getting-zero-trust-right</a></span></p></div>
</div><div data-element-id="elm_nX8gbOipKRwy1Mwf0HlvJg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_nX8gbOipKRwy1Mwf0HlvJg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p>Cloud 9 Advisers, Supplier Spotlight:&nbsp;<span style="color:inherit;font-weight:bold;"><a href="http://www.rsitex.com" title="Renaissance Systems, Inc." target="_blank">Renaissance Systems, Inc.</a></span></p></div>
</div><div data-element-id="elm_jLznsLwAhg5J0isrpxr4LA" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_jLznsLwAhg5J0isrpxr4LA"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Supplier%20Logos/Sec%20RSI.jpg" size="original" data-lightbox="true" style="height:139px;width:246.94px;"/></picture></span></figure></div>
</div><div data-element-id="elm_cZ4rD1wgvny-QIAGFaGQjQ" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_cZ4rD1wgvny-QIAGFaGQjQ"] div.zpspacer { height:30px; } @media (max-width: 768px) { div[data-element-id="elm_cZ4rD1wgvny-QIAGFaGQjQ"] div.zpspacer { height:calc(30px / 3); } } </style><div class="zpspacer " data-height="30"></div>
</div><div data-element-id="elm_eCwWj2BvsENLk1Nvm9_LmA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_eCwWj2BvsENLk1Nvm9_LmA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div>At RSI, our priority is to help companies improve their Cyber Risk Management. While a lot of our clients’ attention is focused on our unique Automated Cyber Risk Management solution, powered by CyberCompass, we also assist our forward-thinking clients to achieve Zero Trust Security through the adoption of our ‘Evolving Trust’ Framework. The purpose of this article is to provide some background on Zero Trust Security, highlight how RSI has re-imagined this strategy, and demonstrate how RSI can help you to adopt true Zero Trust using our Evolving Trust Framework.</div></div>
</div><div data-element-id="elm_-c_SxsRTYg0eZpRGqMK0uQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_-c_SxsRTYg0eZpRGqMK0uQ"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">A Brief History</span></h3></div>
<div data-element-id="elm_YbAGwZioKx8E5rAQXhI5SQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_YbAGwZioKx8E5rAQXhI5SQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div>Historically, network security hasn’t changed that much. Corporate networks were designed like a castle, where all users are screened at the gate (firewall) for appropriate credentials. Once a user is allowed access, they are trusted and therefore have access to all the goodies inside. In this model, it's difficult for a user to get into the ‘castle’, but the network is vulnerable to widespread turmoil if malicious users manage to get in. As the IT landscape has evolved into multiple devices per user, remote work policies, and sketchy Starbucks WiFi, the need for a better way of managing users/access has become dire.</div><p><br></p><div>Hence, Zero Trust is born. Originally known as ‘Zero Trust Network’ or ‘Zero Trust Architecture’, the idea was created in 2009-2010 by Forrester Research Inc.(specifically John Kindervag). While the concept was clever, it took a few years and a BIG company to provide a proof of concept. Google created an enterprise security model, coining it BeyondCorp, and achieved company-wide adoption of the Zero Trust model using home-grown, in-house tools and technologies. BeyondCorp achieved the previously inconceivable; it enabled every employee to work from untrusted networks without the use of a VPN. Since Zero Trust was only a concept at the time, Google had to create and piecemeal together a variety of technologies. Thankfully, there has since been widespread adoption and a variety of technologies created to help you achieve the same vision as Google, but we’ll get to that.</div><p><br></p><div>What is Zero Trust? I encourage you to read more about Google’s BeyondCorp solution to gain insight into the intricacies, but in a nutshell: the Zero Trust model asserts that organizations should not automatically trust anything or anyone inside or outside its perimeter(s). Instead, access controls are shifted from the network perimeter to individual endpoints/users and data analytics (i.e. location, time of day, employee credentials, etc.) are used to create meaningful decisions on whether an access request is appropriate. This all adds up to what is called a ‘Trust Score’, and it’s assigned every time a user attempts to log in. Remember the castle analogy above? Think about it like this: Zero Trust micro-segments your castle into a bunch of little castles. You now have the ability to determine which castle(s) your users have access to. If implemented properly, you no longer have to be connected to the corporate network and can work from any internet connection.</div></div>
</div><div data-element-id="elm_7Syd4Hlql88lFUn2osEi1Q" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_7Syd4Hlql88lFUn2osEi1Q"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;"><div>The Case for <span style="font-style:italic;">Evolving </span>Trust Security</div></span></h3></div>
<div data-element-id="elm_qPUyyucUpmXWxQPJrrUX3w" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_qPUyyucUpmXWxQPJrrUX3w"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div>Early on, RSI understood the value of Zero Trust, especially as businesses increasingly allow remote work, BYOD, and SaaS solutions to accomplish daily tasks. Many companies have moved their most precious data to the cloud and manage an average of 1000 applications at any given time. RSI built a professional services arm to assist companies in understanding the value of this Zero Trust model as well as adopting it without any significant, upfront requirements. In order to accomplish this, we took the Google approach and adopted it ourselves (thankfully we didn’t have to build all the technology from the ground up). This journey allowed us to identify pain points, discern shortcuts from pitfalls, and ultimately develop a framework that adds tremendous value to each of our clients. What’s more, we took the time to look at Zero Trust from a non-traditional lens by including some non-traditional thinkers from our Innovation Center (and its data scientists with their big, beautiful scientific brains). What we identified is a gap in how Zero Trust is discussed, how it is interpreted, and how companies are leveraging the current solutions. RSI took that data and developed our Evolving Trust Framework. The following are some of our biggest takeaways:</div><p><br></p><div><ol><li><span style="font-weight:bold;">One Size <span style="font-style:italic;">Does Not</span> Fit All</span><br>Arguably the most important point I will stress is that while advertisements show you can “adopt Zero Trust in minutes with our tool”, those marketing gurus are causing companies to put the proverbial cart before the horse. Even with incredible SaaS tools at your disposal, you still have to be extremely familiar with the implementation and all the nuances that stem from the process, such as certificate authority, device discovery, and inherent limitations. This requires members of your organization to take the time to understand Zero Trust, understand the variety of required tools, and figure out a launch strategy that doesn’t cripple your organization. Furthermore, while there are a variety of technical solutions on the market that claim ‘Zero Trust Security’ (i.e. OKTA, Duo Security), this is only part of the puzzle. There are more components to the Zero Trust Model than those addressed by these Identity &amp; Access Management (IAM) tools. Without this knowledge and expertise, your Zero Trust strategy will gain zero traction.<br><br></li><li><span style="font-weight:bold;">Easy to Miss the Mark On Execution</span><br>Unfortunately, companies tend to fall into this pit of saying “let’s require every user to authenticate in three different ways every time they access any critical application”. Not only does this create a very difficult beast to manage for your IT department, but it also doesn’t even accomplish some of the biggest potential benefits of Zero Trust. This was the #1 reason RSI created the Evolving Trust framework, and the name says it all: we believe in incorporating deep monitoring/data analytics into the entire process so that checks and balances are strategically placed throughout a users’ access journey rather than just at the beginning. For example, when a user authenticates and meets our basic requirements (i.e. correct credentials, an appropriate device, relevant geo-location), we let them in. Next, we monitor those users and what they are trying to access. If they attempt to access any system/data we deem critical, then we require another authentication check. Finally, we keep an eye on the patterns of each user to detect anomalies in what/when/where they are accessing critical applications or data. This allows us to control the narrative for every user, every time, without creating huge inefficiencies in our organization.<br><br></li><li><span style="font-weight:bold;">Employee Education is Even More Important Than Technology</span><br>Zero Trust is just another component of cyber security and one of the biggest problems that security experts are facing is the fact that people LOVE to skirt rules. It’s human nature to make assumptions that we all know everything and we all deserve the best for ourselves, especially when some very nice Nigerian prince is trying to wire us FREE money. RSI discovered the hard way that this unfortunate mindset carries into the Zero Trust realm. The fact of the matter is, Zero Trust adds at least one extra step for every employee when they attempt to login to a critical application by requiring Multi-Factor Authentication (MFA). This causes some people to lose their minds (especially those pesky developers who are obsessed with minimizing clicks), which creates a snowball effect down the road when they decide to adopt a shiny, new SaaS tool and choose not to tell anyone about it. What’s more, IT experts have developed a mindset that firewalls keep bad actors out and that they can inherently trust their environments. The same people who haven’t changed their server admin passwords in 4 years are now required to shift their mindset to the opposite end of the spectrum, which takes time. Your Zero Trust model is only as powerful as the IT people, processes, and technologies you are in control of, which is why RSI identified other strategies to counteract these risks in the form of discovery tools, monitoring, and data analytics.<br><br></li><li><span style="font-weight:bold;">It Takes A Village Just to Manage A Village</span><br>Similar to the game of Monopoly, acquiring the esteemed Boardwalk space is only half the battle. You still have to enforce and manage your acquisition or the positive effects are moot. Zero Trust requires a SOC team to actively manage access, evaluate trust scores on a periodic basis, track new assets, and manage vulnerable endpoints (i.e. outdated OS, vulnerable applications, etc.). RSI treated our implementation as an opportunity to train our entire Technical Assistance Center (TAC) team, creating a squad of experts in the entire Zero Trust Management process and providing them the tools to scale this expertise to our clients. One of the biggest benefits of our Evolving Trust framework is that it requires a LOT less effort for our TAC team to manage access because we have automated many of the previously manual processes.</li></ol></div></div>
</div><div data-element-id="elm_tvu7Je8Lh7DDguJT3omq_Q" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_tvu7Je8Lh7DDguJT3omq_Q"].zpelem-text { border-radius:1px; margin-block-start:63px; } </style><div class="zptext zptext-align-left " data-editor="true"><div>In summary, Zero Trust is an incredibly useful strategy for companies to keep up with the evolving IT landscape of endless personal devices, SaaS solutions out the wazoo, and cyber-crime galore. In my humble opinion, I don’t see how any company can keep up with this transformation without Zero Trust. However, I’m concerned that many companies are fooled by the current glamour of Zero Trust and their desperation to improve overall cyber hygiene can create more problems than solutions. RSI is working hard to address the Access Management cyber epidemic, and we strongly believe that the Zero Trust model (more specifically, our Evolving Trust framework) is a huge step in the right direction.</div></div>
</div><div data-element-id="elm_dfuFRhtU_UFpK1Xr-NUKTw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_dfuFRhtU_UFpK1Xr-NUKTw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><p><span style="font-size:18px;font-weight:bold;">To learn more about Zero Trust and how RSI can help, please contact Cloud 9 Advisers.&nbsp;</span></p><p><span style="font-size:18px;font-weight:bold;">RSI is a member of the Cloud 9 Supplier Portfolio</span></p></div>
</div><div data-element-id="elm_H9sSNBiVQNKH6BbfTsm1zA" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_H9sSNBiVQNKH6BbfTsm1zA"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-oval " href="mailto:consulting@Cloud9Advisers.com?subject=I'd like to learn about Cloud 9 Advisers" title="email: consulting@Cloud9Advisers.com"><span class="zpbutton-content">Learn More</span></a></div>
</div><div data-element-id="elm_RBVsAV4oOft68H40wlYavg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_RBVsAV4oOft68H40wlYavg"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">About RSI</h2></div>
<div data-element-id="elm_Rk7t7Iyt2D0Y9HqriXjUOQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_Rk7t7Iyt2D0Y9HqriXjUOQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div>RSI transforms company and culture through fully automated solutions for business workflow. We serve the enterprise with software solutions for business process improvement, artificial intelligence for big data, and custom, managed IT services.</div><p><span style="color:inherit;"><br></span></p><div>RSI is the exclusive channel distributor of CyberCompass™, a SaaS solution for cyber risk management and remediation.</div><p><span style="color:inherit;"><br></span></p><div><span style="color:inherit;"><div><ul><li>Automated solutions for business workflow</li><li>AI solutions for data analytics</li><li>Custom, managed IT services</li><li>Exclusive distributor of CyberCompass™, automated cyber risk management</li><li>Drone Services</li></ul></div><br><div><span style="color:inherit;">For more than 35 years, the passion for helping people has transformed our business and that of our customers. By developing strong partnerships with our clients, we have a deeper understanding of what they need to better run their businesses. As a result, our services have expanded for a greater reach with every client.</span><br></div></span></div></div>
</div><div data-element-id="elm_O88xUHjSrO4y97kjAqkIPg" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_O88xUHjSrO4y97kjAqkIPg"].zpelem-divider{ border-radius:1px; } </style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_hjWRgLAI8r0Z5tbVOx4d4g" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> [data-element-id="elm_hjWRgLAI8r0Z5tbVOx4d4g"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="right" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-small zpimage-tablet-fallback-small zpimage-mobile-fallback-small hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/files/C9-Logo1.1.150.t.png" size="small" data-lightbox="true" style="width:1800px;padding:0px;margin:0px;"/></picture></span></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div><span style="color:inherit;"><p><span style="font-size:11pt;">Your Agent.&nbsp; Your Advocate. Your Adviser.</span></p><p><span style="font-size:11pt;font-weight:bold;"><br></span></p><p><span style="font-size:11pt;font-weight:bold;">Because it’s all about you.&nbsp;</span></p><p><span style="font-size:11pt;"><br></span></p><p><span style="font-size:11pt;">Cloud 9 Advisers will save you time during the often exhausting process of finding, evaluating, and selecting new technologies and competitive providers. We become an extension of your team and help manage the entire bidding and procurement process. We will save you money by using the buying power of thousands of other clients through our curated Supplier Portfolio, and finding the right companies from our portfolio to bid on your requirements. We provide you clarity by distilling all the information from each bidder, and clear the clutter so you can make the right decision on the best solution and provider. Cloud 9 gives you confidence throughout the decision-making process by continually evaluating the bidders and negotiating the best price and terms, so you can focus on what you do best.&nbsp;</span></p><br><p style="text-align:center;"><span style="font-size:11pt;font-weight:700;">Technology Partners. Strategic Advisers.</span></p><div><span style="font-size:11pt;font-weight:700;"><br></span></div></span></div></div>
</div></div></div></div></div></div></div> ]]></content:encoded><pubDate>Mon, 03 Feb 2020 10:29:06 -0500</pubDate></item></channel></rss>