{"id":8544,"date":"2022-01-28T03:25:00","date_gmt":"2022-01-28T03:25:00","guid":{"rendered":"https:\/\/www.insentragroup.com\/us\/insights\/uncategorized\/zero-trust-and-applications-protect-critical-data\/"},"modified":"2023-04-27T14:27:40","modified_gmt":"2023-04-27T14:27:40","slug":"zero-trust-and-applications-protect-critical-data","status":"publish","type":"post","link":"https:\/\/www.insentragroup.com\/us\/insights\/geek-speak\/fasttrack\/zero-trust-and-applications-protect-critical-data\/","title":{"rendered":"Zero Trust and Applications: Protect Critical Data"},"content":{"rendered":"\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe title=\"Zero Trust and Applications: Protect Critical Data\" width=\"750\" height=\"422\" src=\"https:\/\/www.youtube.com\/embed\/VT3O9ZyRthI?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<p>The global pandemic has forever changed the workplace and has reshaped the priorities around cybersecurity. Recent months have shown that cloud apps have helped people around the globe stay productive and connected, however, did you know that they also pose an increased cybersecurity risk to businesses large and small, especially when you don\u2019t know which cloud apps your users may be using. With many businesses now adopting a hybrid workforce, security needs to be at the forefront of every cloud app deployment.<\/p>\n\n\n\n<p>Even before the pandemic began, businesses were finding limited success with low visibility into data, user behavior, and the movement of sensitive data to the cloud.<\/p>\n\n\n\n<p>A&nbsp;<a href=\"https:\/\/tools.totaleconomicimpact.com\/go\/microsoft\/CloudAppSecurity\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Total Economic Impact Study in May 2020 by Forrester<\/a>&nbsp;confirmed that these limitations experienced by many businesses have led to the rise of shadow IT, difficulties with recognizing and remediating security threats, and the ability to adapt to evolving compliance requirements for cloud services.<\/p>\n\n\n\n<p>Addressing these limitations with<a href=\"https:\/\/www.insentragroup.com\/us\/insights\/resources\/ebooks-and-guides\/the-ultimate-guide-to-zero-trust\/\" target=\"_blank\" rel=\"noreferrer noopener\"> Zero Trust<\/a> in mind should include the deployment of Defender for Cloud Apps and the Forrester study confirmed that the deployment of Defender for Cloud Apps:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Led to an 80% reduction in time to monitor, assess and govern cloud application portfolio risks, totaling a saving of more than $571,000<\/li>\n\n\n\n<li>Lowered the time and effort to remediate incidents by up to 80%<\/li>\n\n\n\n<li>Automatically eliminated 75% of threats due to the increased visibility and automation capabilities<\/li>\n\n\n\n<li>Reduced the likelihood of a data breach by 40%<\/li>\n\n\n\n<li>Kept compliance costs down by reducing time spent on audit reporting by 90%<\/li>\n<\/ul>\n\n\n\n<p>To ensure you\u2019re able to protect sensitive information and get ahead of any shadow IT concerns, watch my latest FastTrack Update, where I explain the recommended settings that you should consider deploying using Defender for Cloud Apps. Following these recommendations will help meet your Applications Zero Trust objectives and ensure users are not only accessing sanctioned applications across your network but are doing so in a secure manner to prevent any form of lateral movement by malicious actors.<\/p>\n\n\n\n<p>If you missed it, check out my previous FastTrack Updates, where I explored the capabilities available across the first two foundation pillars of Zero Trust \u2013&nbsp;<a id=\"\" href=\"https:\/\/www.insentragroup.com\/us\/insights\/geek-speak\/fasttrack\/microsoft-fasttrack-zero-trust-and-identity-shifting-the-security-controls\/\" target=\"_blank\" rel=\"noreferrer noopener\">Identity<\/a>&nbsp;and&nbsp;<a id=\"\" href=\"https:\/\/www.insentragroup.com\/us\/insights\/geek-speak\/fasttrack\/microsoft-fasttrack-zero-trust-and-endpoints-secure-them-all\/\" target=\"_blank\" rel=\"noreferrer noopener\">Endpoints<\/a>.<\/p>\n\n\n\n<p>The global pandemic has highlighted the importance of cloud security and adopting a Zero Trust approach to protect sensitive information. Insentra\u2019s&nbsp;<strong><a href=\"https:\/\/www.insentragroup.com\/us\/zero-trust-security-assessment\/\">Zero Trust Assessment<\/a><\/strong>&nbsp;provides a comprehensive evaluation of your organization\u2019s network security, identifying vulnerabilities and providing actionable recommendations for a Zero Trust framework. Schedule yours today and take control of your cloud security and prevent any form of lateral movement by malicious actors.<\/p>\n\n\n\n<style>.attachment-full {\n  display: none !important;\n}<\/style>\n","protected":false},"excerpt":{"rendered":"<p>The global pandemic has forever changed the workplace and has reshaped the priorities around cybersecurity. Recent months have shown that cloud apps have helped people around the globe stay productive and connected, however, did you know that they also pose an increased cybersecurity risk to businesses large and small, especially when you don\u2019t know which&hellip; <a class=\"more-link\" href=\"https:\/\/www.insentragroup.com\/us\/insights\/geek-speak\/fasttrack\/zero-trust-and-applications-protect-critical-data\/\">Continue reading <span class=\"screen-reader-text\">Zero Trust and Applications: Protect Critical Data<\/span><\/a><\/p>\n","protected":false},"author":52,"featured_media":8546,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[23],"tags":[],"class_list":["post-8544","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-fasttrack","entry"],"_links":{"self":[{"href":"https:\/\/www.insentragroup.com\/us\/wp-json\/wp\/v2\/posts\/8544","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.insentragroup.com\/us\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.insentragroup.com\/us\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.insentragroup.com\/us\/wp-json\/wp\/v2\/users\/52"}],"replies":[{"embeddable":true,"href":"https:\/\/www.insentragroup.com\/us\/wp-json\/wp\/v2\/comments?post=8544"}],"version-history":[{"count":6,"href":"https:\/\/www.insentragroup.com\/us\/wp-json\/wp\/v2\/posts\/8544\/revisions"}],"predecessor-version":[{"id":16282,"href":"https:\/\/www.insentragroup.com\/us\/wp-json\/wp\/v2\/posts\/8544\/revisions\/16282"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.insentragroup.com\/us\/wp-json\/wp\/v2\/media\/8546"}],"wp:attachment":[{"href":"https:\/\/www.insentragroup.com\/us\/wp-json\/wp\/v2\/media?parent=8544"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.insentragroup.com\/us\/wp-json\/wp\/v2\/categories?post=8544"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.insentragroup.com\/us\/wp-json\/wp\/v2\/tags?post=8544"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}