Site icon GovLoop

Beyond Zero Trust: How to Strengthen Your Data Resilience

Data security continues to evolve. In recent years, many government agencies have shifted from perimeter-based security to a zero-trust network architecture, with a focus on identity-based access management. While important, this strategy does not address the full scope of data security requirements.

The next step is to evolve from security to resilience by developing a data-centric architecture that aligns with the full data lifecycle, said Greg Carl, Principal Technologist for U.S. Federal at Pure Storage.

“It’s not about perimeter-based security, like putting a moat around the castle,” Carl said. “It’s about protecting every single aspect of our data, from inception all the way to decommission.”

In this video interview, Carl discusses how agencies can take a more holistic approach to protecting their data. Topics include:

Exit mobile version