Uploaded on Sep 1, 2022
PPT on cybersecurity mesh.
What is cybersecurity mesh and how can it help you?
What is cybersecurity
mesh and how can it
help you?
Introduction
The concept of cybersecurity mesh could
help solve and simplify issues created by
multi-cloud deployments and the increase in
remote work environments.
8 / 0 5 / 2 0 XX 2
S O U R C E : W W W. T E C H T A R G E T. C O M
What is cybersecurity
mesh?
Cybersecurity mesh architecture (CSMA) is
an architectural approach rather than a
specific technology or market segment.
It is a similar concept to zero trust. However,
while zero trust presupposes that every
device in an ecosystem is already
compromised and potentially hostile, CSMA
sees environments as disparate, logically
separated and heterogeneous.
8 / 0 5 / 2 0 XX 3
S O U R C E : W W W. T E C H T A R G E T. C O M
Four distinct layers
1. security analytics and intelligence
2. distributed identity fabric
3. consolidated policy and posture
management
4. consolidated dashboards
8 / 0 5 / 2 0 XX 4
S O U R C E : W W W. T E C H T A R G E T. C O M
Short-term effects of
cybersecurity mesh
Practical-minded practitioners might be
asking how all of this changes their day-to-
day lives. The answer is that it doesn't at
least not directly or in the short term.
8 / 0 5 / 2 0 XX 5
S O U R C E : W W W. T E C H T A R G E T. C O M
Long-term effects of
cybersecurity mesh
1. Philosophical shifts sometimes drive the
market, and the market, in turn,
influences real-life architectures.
2. Industry acceptance makes it easier to
incorporate the concept into architectural
approaches.
3. It helps drive interoperability.
8 / 0 5 / 2 0 XX 6
S O U R C E : W W W. T E C H T A R G E T. C O M
Why Enterprises Need
Cybersecurity Mesh?
Cybersecurity mesh is the most practical and
adaptable approach for dealing with these
threats in an enterprise-level organization.
It extends security across your entire
architecture, making it possible to secure all
systems and points of access with a single,
unified set of technologies. Further, because
it is driven by the most recent threat
intelligence, a cybersecurity mesh can
evolve as new threats emerge.
8 / 0 5 / 2 0 XX 7
S O U R C E : W W W. F O R T I N E T. C O M
Applications of
Cybersecurity Mesh
1. Prepare for the future. Your organization can
be positioned to respond to future security
risks by selecting cybersecurity technologies
that facilitate integration. For example, there
are plug-in application programming
interfaces (APIs) that allow customization and
extensions, as well as extensible analytics.
8 / 0 5 / 2 0 XX 8
S O U R C E : W W W. F O R T I N E T. C O M
Applications of
Cybersecurity Mesh
cont.
1. Close the gaps. Using current and emerging
security standards, you can close any security
gaps due to weaknesses and vulnerabilities in
different solutions.
8 / 0 5 / 2 0 XX 9
S O U R C E : W W W. F O R T I N E T. C O M
Key Considerations When
Adopting Cybersecurity
Mesh
1. Vulnerability: There has been a 600% increase
in phishing schemes over the past couple of
years, and ransomware attacks occur every 11
seconds. This exposes the reality that current
IT systems are vulnerable. In addition to
existing vulnerabilities, there is the threat of a
zero-day attack, an attack by a method
previously unknown.
8 / 0 5 / 2 0 XX 1 0
S O U R C E : W W W. F O R T I N E T. C O M
Key Considerations When
Adopting Cybersecurity Mesh
cont.
1. Cost: The cost of ransomware attacks alone is
about $6 trillion annually, and the cost of
cybercrime attacks is on the rise at about 15%
per year. Digital transformation incurs its own
cost, too, especially if an organization’s
infrastructure or architecture has to be
redesigned.
8 / 0 5 / 2 0 XX 1 1
S O U R C E : W W W. F O R T I N E T. C O M
Comments