Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and Copilots
    • Innovation & Leadership
    • Cybersecurity
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
  • Summit NA
  • Dynamics Communities
  • Ask Copilot
Twitter Instagram
  • Summit NA
  • Dynamics Communities
  • AI Copilot Summit NA
  • Ask Cloud Wars
Twitter LinkedIn
Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and CopilotsWelcome to the Acceleration Economy AI Index, a weekly segment where we cover the most important recent news in AI innovation, funding, and solutions in under 10 minutes. Our goal is to get you up to speed – the same speed AI innovation is taking place nowadays – and prepare you for that upcoming customer call, board meeting, or conversation with your colleague.
    • Innovation & Leadership
    • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
    • Login / Register
Cloud Wars
    • Login / Register
Home » How to Implement Zero Trust For Remote Endpoints in the Enterprise
Cybersecurity

How to Implement Zero Trust For Remote Endpoints in the Enterprise

Chris HughesBy Chris HughesMay 28, 2023Updated:May 29, 20234 Mins Read
Facebook Twitter LinkedIn Email
endpoint security zero trust
Share
Facebook Twitter LinkedIn Email
Acceleration Economy Cybersecurity

Between efforts like the White House’s Cybersecurity Executive Order and others from industry leaders like Microsoft and AWS, zero trust is quickly becoming the de facto approach to securing modern enterprises. My recent experience at the RSA Conference, where discussions of zero trust between leading vendors and security practitioners were front and center, further underscores this change.

At the same time, most large enterprises are increasingly dealing with a remotely-distributed workforce, all working from endpoint devices. This generally includes traditional PCs, laptops, and, increasingly, mobile devices. This trend means enterprises need a strategy to effectively implement zero trust for these distributed employees and their associated endpoints, all of which will be used to access corporate data and systems.

In this analysis, we will take a look at zero trust from the perspective of the organizational endpoint and users.

Which companies are the most important vendors in cybersecurity? Check out
the Acceleration Economy Cybersecurity
Top 10 Shortlist
.

Key Considerations for Endpoint Zero Trust

When striving for zero trust maturity, it is crucial to take into account several key considerations for endpoints. These considerations encompass device identity verification, access control, endpoint detection and response (EDR), and monitoring and analytics.

Endpoint Verification and Governance

Organizations need to have both a strategy and technical capability to verify the identity of the devices and endpoints connecting to their environments, systems, and data. As pointed out by leaders such as Microsoft, when it comes to zero trust, not all endpoints are managed or even owned by the organization. This means there will be a diverse set of endpoint configurations, software inventory, and associated configurations, which much be verified and governed. Failing to govern and verify the security posture of endpoints will significantly hinder zero-trust implementation.

Access Control

Organizations must implement techniques such as unified endpoint management to govern devices and their associated access and use as well as to implement effective access control. This diverse reality of endpoint posture and configuration means you will also have a diverse set of access controls and dynamic access management associated with the devices’ identity, posture, and behavior. Utilizing signals such as device posture, patch status, governed or BYoD (Bring Your Own Device), geolocation, and more can enable organizations to make context-rich dynamic access control decisions.

Endpoint Detection and Response (EDR)

Another key consideration, particularly for managed/governed devices, is implementing technologies such as endpoint detection and response (EDR). This enables organizations to detect and respond to security incidents on the endpoints and provide visibility and reporting to centralized entities such as security operations center (SOC) teams. Being able to automate the response to an emerging security incident can mean the difference between a benign security incident and a material event that has broader organizational implications.

Monitoring and Analytics

Lastly, there’s monitoring and analytics. Monitoring and analytics are critical for organizations to detect and respond to incidents and utilize analytics to identify anomalous behavior which may be malicious and a sign of more nefarious activities underway in their systems and environments.

Tooling such as EDR and UEM (unified endpoint management) enable organizations to have this visibility, feed these signals to centralized aggregation points, and make actionable decisions. Sources such as CISA’s Zero Trust Maturity Model 2.0 cites visibility and analytics as a key capability associated with devices. The model lists the most mature organizations having the ability to automate status collection of all network-connected devices and correlate that information with other data such as identities and patterns of behavior. They can dynamically provision or de-provision access utilizing these analytics and insights to mitigate malicious behavior.

Insights into Why & How to Recover from a Cybersecurity Breach
Guidebook: Cybersecurity Breach and Recovery Response

Final Thoughts

Despite the dissolution of the legacy perimeter-based model of cybersecurity, zero trust still requires organizations to have robust capabilities and a strategy to implement security for endpoints accessing their organizational data and systems. Failing to do so can introduce significant risk to the organization and the data they utilize.


Want more cybersecurity insights? Visit the Cybersecurity channel:

Acceleration Economy Cybersecurity

automation AWS Cybersecurity Microsoft mobile zero trust
Share. Facebook Twitter LinkedIn Email
Analystuser

Chris Hughes

CEO and Co-Founder
Aquia

Areas of Expertise
  • Cloud
  • Cybersecurity
  • LinkedIn

Chris Hughes is a Cloud Wars Analyst focusing on the critical intersection of cloud technology and cybersecurity. As co-founder and CEO of Aquia, Chris draws on nearly 20 years of IT and cybersecurity experience across both public and private sectors, including service with the U.S. Air Force and leadership roles within FedRAMP. In addition to his work in the field, Chris is an adjunct professor in cybersecurity and actively contributes to industry groups like the Cloud Security Alliance. His expertise and certifications in cloud security for AWS and Azure help organizations navigate secure cloud migrations and transformations.

  Contact Chris Hughes ...

Related Posts

How One Company Added 20% to Profit with Cloud Optimization

June 27, 2025

AI Agent & Copilot Podcast: ServiceNow Innovation Officers Outline Agentic AI Opportunities in Healthcare

June 27, 2025

The AI Economy: Oracle More Valuable than Disney, Goldman Sachs, and Uber Combined

June 26, 2025

Microsoft Delivers In-Depth View of Security, Governance Functions in Copilot Control System

June 26, 2025
Add A Comment

Comments are closed.

Recent Posts
  • AI Agent & Copilot Podcast: ServiceNow Innovation Officers Outline Agentic AI Opportunities in Healthcare
  • How One Company Added 20% to Profit with Cloud Optimization
  • Workday Sets the Standard for Responsible AI with Dual Governance Accreditations
  • The AI Economy: Oracle More Valuable than Disney, Goldman Sachs, and Uber Combined
  • Microsoft Delivers In-Depth View of Security, Governance Functions in Copilot Control System

  • Ask Cloud Wars AI Agent
  • Tech Guidebooks
  • Industry Reports
  • Newsletters

Join Today

Most Popular Guidebooks

Accelerating GenAI Impact: From POC to Production Success

November 1, 2024

ExFlow from SignUp Software: Streamlining Dynamics 365 Finance & Operations and Business Central with AP Automation

September 10, 2024

Delivering on the Promise of Multicloud | How to Realize Multicloud’s Full Potential While Addressing Challenges

July 19, 2024

Zero Trust Network Access | A CISO Guidebook

February 1, 2024

Advertisement
Cloud Wars
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Marketing Services
  • Do not sell my information
© 2025 Cloud Wars.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?
Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.