Zero Trust Adoption Is Increasing for UCaaS Organizations
The pandemic forced companies to prepare for the onslaught of employees working from home. As a result, IT departments had difficulty keeping up with this new dynamic: how to monitor and secure so many remote systems.
“Simultaneously, organizations embraced digital transformation and mobile-first initiatives in the unified communications and collaboration (UCC) and contact center space,” said Elizabeth English, member of SCTC. “As a result, VPNs were often overwhelmed or breached, stalling digital transformation and productivity for remote workers.”
In these circumstances, UCaaS and CCaaS organizations began relying on the principles of zero trust: always authenticating and authorizing based on all available data points; limiting user access; and minimizing blast radius and segment access.
GoTo said they may be a vanguard among UCaaS companies when it comes to embracing zero trust up and down the stack inside its company to protect infrastructure services.
GoTo CEO Paddy Srinivasan told Channel Futures:
“We have multilayer authentication for all our production systems, developer environments, and so forth. It becomes really hard for anyone either with malintent or by negligence to leave something exposed to a bad actor. We are embracing zero trust as a philosophy to protect our internal systems, but also implementing it as concrete technology in many of our products now so that we protect our customers and their data; their endpoints are protected on an ongoing basis.”
To protect on an ongoing basis means getting the zero trust buy in of not just the CISO, but all operations leaders and department heads. Expect zero trust, despite its buzzword status, to still be a topic of conversation in 2023.