Governance & Risk Management , Video , Zero Trust

Simplifying Implementation of a Zero Trust Architecture

Akamai's Pavel Gurvich on Where to Start, Steps to Take to Implement Zero Trust
Pavel Gurvich, senior vice president and general manager, Akamai's Enterprise Security business

The primary challenge with zero trust is keeping it simple, operationally efficient and easy to understand, with predictably positive outcomes. This is achieved across various systems, not with different solutions, policies and technologies in different areas, and it should involve minimal friction.

Pavel Gurvich of Akamai says zero trust is all about making systems safer but since bad things will happen, it's also about lessening the impact when they do.

In this video interview with Information Security Media Group, Gurwich describes the principles for zero trust:

  • Don’t give anything trust by default;
  • When you give trust, such as access, give as little as possible;
  • Keep monitoring and recording so that when something bad happens, you have the visibility to understand what caused it.

Gurvich is responsible for Akamai's zero trust-focused security solutions, including microsegmentation, zero trust network access and multifactor authentication. He joined Akamai as part of its acquisition of Guardicore. After spending 12 years as a cybersecurity expert in the Israel Defense Forces, Gurvich became CEO and co-founder of Guardicore, which was created in 2013 to protect enterprises from damage caused by breaches such as ransomware, while safeguarding critical assets at the heart of the network.


About the Author

Tony Morbin

Tony Morbin

Executive News Editor, EU

Morbin is a veteran cybersecurity and tech journalist, editor, publisher and presenter working exclusively in cybersecurity for the past decade – at ISMG, SC Magazine and IT Sec Guru. He previously covered computing, finance, risk, electronic payments, telecoms, broadband and computing, including at the Financial Times. Morbin spent seven years as an editor in the Middle East and worked on ventures covering Hong Kong and Ukraine.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.