Search
00
GBAF Logo
trophy
Top StoriesInterviewsBusinessFinanceBankingTechnologyInvestingTradingVideosAwardsMagazinesHeadlinesTrends

Subscribe to our newsletter

Get the latest news and updates from our team.

Global Banking & Finance Review®

Global Banking & Finance Review® - Subscribe to our newsletter

Company

    GBAF Logo
    • About Us
    • Advertising and Sponsorship
    • Profile & Readership
    • Contact Us
    • Latest News
    • Privacy & Cookies Policies
    • Terms of Use
    • Advertising Terms
    • Issue 81
    • Issue 80
    • Issue 79
    • Issue 78
    • Issue 77
    • Issue 76
    • Issue 75
    • Issue 74
    • Issue 73
    • Issue 72
    • Issue 71
    • Issue 70
    • View All
    • About the Awards
    • Awards Timetable
    • Awards Winners
    • Submit Nominations
    • Testimonials
    • Media Room
    • FAQ
    • Asset Management Awards
    • Brand of the Year Awards
    • Business Awards
    • Cash Management Banking Awards
    • Banking Technology Awards
    • CEO Awards
    • Customer Service Awards
    • CSR Awards
    • Deal of the Year Awards
    • Corporate Governance Awards
    • Corporate Banking Awards
    • Digital Transformation Awards
    • Fintech Awards
    • Education & Training Awards
    • ESG & Sustainability Awards
    • ESG Awards
    • Forex Banking Awards
    • Innovation Awards
    • Insurance & Takaful Awards
    • Investment Banking Awards
    • Investor Relations Awards
    • Leadership Awards
    • Islamic Banking Awards
    • Real Estate Awards
    • Project Finance Awards
    • Process & Product Awards
    • Telecommunication Awards
    • HR & Recruitment Awards
    • Trade Finance Awards
    • The Next 100 Global Awards
    • Wealth Management Awards
    • Travel Awards
    • Years of Excellence Awards
    • Publishing Principles
    • Ownership & Funding
    • Corrections Policy
    • Editorial Code of Ethics
    • Diversity & Inclusion Policy
    • Fact Checking Policy
    Original content: Global Banking and Finance Review - https://www.globalbankingandfinance.com

    A global financial intelligence and recognition platform delivering authoritative insights, data-driven analysis, and institutional benchmarking across Banking, Capital Markets, Investment, Technology, and Financial Infrastructure.

    Copyright © 2010-2026 - All Rights Reserved. | Sitemap | Tags

    Editorial & Advertiser disclosure

    Global Banking & Finance Review® is an online platform offering news, analysis, and opinion on the latest trends, developments, and innovations in the banking and finance industry worldwide. The platform covers a diverse range of topics, including banking, insurance, investment, wealth management, fintech, and regulatory issues. The website publishes news, press releases, opinion and advertorials on various financial organizations, products and services which are commissioned from various Companies, Organizations, PR agencies, Bloggers etc. These commissioned articles are commercial in nature. This is not to be considered as financial advice and should be considered only for information purposes. It does not reflect the views or opinion of our website and is not to be considered an endorsement or a recommendation. We cannot guarantee the accuracy or applicability of any information provided with respect to your individual or personal circumstances. Please seek Professional advice from a qualified professional before making any financial decisions. We link to various third-party websites, affiliate sales networks, and to our advertising partners websites. When you view or click on certain links available on our articles, our partners may compensate us for displaying the content to you or make a purchase or fill a form. This will not incur any additional charges to you. To make things simpler for you to identity or distinguish advertised or sponsored articles or links, you may consider all articles or links hosted on our site as a commercial article placement. We will not be responsible for any loss you may suffer as a result of any omission or inaccuracy on the website.

    1. Home
    2. >Business
    3. >Zero Trust: The New Standard of Security?
    Business

    Zero Trust: The New Standard of Security?

    Published by Jessica Weisman-Pitts

    Posted on November 9, 2021

    5 min read

    Last updated: January 28, 2026

    Add as preferred source on Google
    In this image, Polish President Andrzej Duda is signing the 2025 budget, which he plans to send to the Constitutional Tribunal for review. This significant financial decision impacts Poland's economic future and governance.
    Polish President Andrzej Duda signs the 2025 budget amid constitutional review - Global Banking & Finance Review
    Why waste money on news and opinion when you can access them for free?

    Take advantage of our newsletter subscription and stay informed on the go!

    Subscribe

    Quick Summary

    Zero Trust security treats all users and devices as untrusted, requiring strong identity verification and network segmentation for enhanced protection.

    Zero Trust Security: The Emerging Standard for Protection

    A Zero Trust security system is an approach to the design and implementation of information security systems that assume every user, device or application accessing an IT system is untrusted and must be treated with the same level of scrutiny.

    The traditional approach to computer security has long been based on perimeter defences being designed based on threat intelligence about the most likely attackers targeting a network or organization. These approaches have begun to struggle when faced with new types of attacks and evolutions in the threat landscape.

    Perimeter-based defences, such as firewalls or signature-based antivirus software are no longer sufficient to protect networks.

    In this article, Charles Griffiths, Head of IT and Operations at AAG-IT.com shares his tips for implementing the strategy.

    How can organisations adopt Zero Trust security principles?

    Rolling out Zero Trust across an entire organisation requires control over identities, devices, applications, data, infrastructure and networks. Zero Trust is not a single product or appliance to buy, but an ideology of security. It involves pulling the traditional perimeter back and combining traditional network access controls with user behaviour analytics (UBA) and micro-segmentation.

    If you are planning on adopting Zero Trust initiatives in your organization, this is what you need to take into account:

    • Identities

    Strong identities are a fundamental part of Zero Trust, and they’re critical for establishing trust and access within the environment. Strong identities are also important for supporting a Zero Trust framework because they are the basis of verifying users before accessing systems. One method of enabling strong identity is to leverage multi-factor authentication methods such as two-factor (2FA) or mobile authentication.

    • Multifactoral Authentification

    Multifactor or continuous authentication is not a single approach, but several methods that can be deployed together to add levels of trust on top of an identity framework. The three basic approaches to authentication are:

    1. Single-factor authentication (SFA): This is based on something you know, such as a user ID and password or PIN. It’s the most common authentication method used today
    2. Multi-factor authentication (MFA): This is based on something you have, such as a security token, smart card or mobile device. MFA can be combined with SFA.
    3. Continuous Authentication (CFA): This is a method of confirming identity in real-time. It’s accurate, convenient and prevents attacks that have been successful in the past because it doesn’t rely on static data.

    MFA and CFA are recommended levels of security within a Zero Trust framework.

    • Passwordless Authentication

    We recommend methods of passwordless authentication to our clients such as the YubiKey. The Yubikey is a hardware-based device that replaces passwords. It’s a durable, inexpensive and convenient method of strong authentication that can also be used as a USB HID device or NFC.

    • Network Segmentation

    Network segmentation and the ability to implement network controls allow for traffic policy to be implemented for each department and application. By taking advantage of micro-segmentation, a network can introduce finer levels of granular controls within the firewall or perimeter to limit access, protect against denial-of-service attacks, etc. NetSeg is a framework that enables this type of authentication framework in open source systems.

    • Secure ALL devices on your network

    Allowing unaudited and unpatched devices onto your network has the potential to cause a lot of damage. In the past, it was fairly easy to block all devices that weren’t part of your network policies, but today’s world involves BYOD (Bring Your Own Device) and other scenarios where users and vendors connect new or unapproved devices to the network regularly. View every user device as a potential threat and limit access to sensitive resources.

    • Be specific with user roles and access

    Security control should become an integral part of organisational policy. Roles and access should be as granular as possible, with clear definitions for each role. For a good example of this framework in action, take a look at AWS’s Identity and Access Management (IAM) framework. It has become one of the best examples of an effective identity framework thanks to its clear separation between roles and privileges.

    ———————————————————————————————————————

    If you do plan on adopting Zero Trust initiatives in your organization then bear in mind the following advice:

    A Zero Trust framework isn’t something that can be implemented overnight. Ensure you start in a test or development environment, and once the Zero Trust model has been successfully established, aim to implement it to your entire digital architecture.

    Charles Griffiths from AAG.com further explains that “the best way to do something with “Zero Trust” seems to be to not have trust at all. As in, don’t rely on any single measure of security and make sure that your cybersecurity is complete from all angles without relying on a single form of protection as the end-all. Be aware of any potential security issues and be prepared right from the start. Only having one form of defence can leave you in a vulnerable position if that strategy fails (which it might), so invest in the many different forms of defence and be ready. Once it’s established, you’ll be good to go.”

    Key Takeaways

    • •Zero Trust assumes all users and devices are untrusted.
    • •Traditional perimeter defenses are insufficient against modern threats.
    • •Strong identities and multi-factor authentication are crucial.
    • •Network segmentation enhances security by limiting access.
    • •Passwordless authentication offers a secure alternative to passwords.

    Frequently Asked Questions about Zero Trust: The New Standard of Security?

    1What is the main topic?

    The article discusses Zero Trust security, a cybersecurity approach that treats all users and devices as untrusted.

    2How can organizations implement Zero Trust?

    Organizations can implement Zero Trust by controlling identities, devices, applications, and using multi-factor authentication.

    3What is network segmentation?

    Network segmentation involves dividing a network into smaller parts to enhance security and limit access.

    More from Business

    Explore more articles in the Business category

    Image for Nominate Now: Chairman of the Year 2026
    Nominate Now: Chairman of the Year 2026
    Image for Submit Your Entry Today for CEO of the Year 2026
    Submit Your Entry Today for CEO of the Year 2026
    Image for Submit Your Entry Today for Best Management Team 2026
    Submit Your Entry Today for Best Management Team 2026
    Image for Nominate Your Team: Best Innovation Management Team 2026
    Nominate Your Team: Best Innovation Management Team 2026
    Image for Submit Your Entry for Years of Excellence Awards 2026
    Submit Your Entry for Years of Excellence Awards 2026
    Image for Nominations Open for Travel & Hospitality Awards 2026
    Nominations Open for Travel & Hospitality Awards 2026
    Image for Submit Your Entry Today for Telecom Awards 2026
    Submit Your Entry Today for Telecom Awards 2026
    Image for Submit Your Entries for The Next 100 Global Awards 2026
    Submit Your Entries for the Next 100 Global Awards 2026
    Image for Submit Your Entry: Public Sector & Governance Excellence Awards 2026
    Submit Your Entry: Public Sector & Governance Excellence Awards 2026
    Image for Nominations Invited for Real Estate Development Awards 2026
    Nominations Invited for Real Estate Development Awards 2026
    Image for Submit Your Entry: Process & Product Awards 2026
    Submit Your Entry: Process & Product Awards 2026
    Image for Call for Entries: HR & Recruitment Awards 2026
    Call for Entries: HR & Recruitment Awards 2026
    View All Business Posts
    Previous Business PostChampioning Women in Business
    Next Business PostQatar to Establish a FinTech Trade Finance Platform Serving the Middle East and Central Asia From Qfc (Qatar Financial Centre)