Andrew Buss, IDC | This IDC Technology Spotlight discusses how an approach to encrypting data and requiring authorization access allows organizations to regain control of their critical digital assets. Take control of your distributed data.
Ionic Security Named in Forrester Wave™ Report on Zero Trust eXtended Ecosystem (ZTX) Providers
“The Forrester Wave™: Zero Trust eXtended Ecosystem Platform Providers, Q3 2020” report evaluates the current offering, strategy and market presence of 15 vendors selected based on specific inclusion criteria.
Dr. Chase Cunningham, Forrester Research principal analyst and author of the report, writes in it that Ionic has “significant chops for those seeking to enable Zero Trust for developers, contractors, and third parties. The vendor’s system makes granular authorization easy and helps make encryption more achievable at scale.”
Orchestrating the definition and enforcement of policy from a central layer enables automated responses to threats, business drivers, and regulations. NIST SP 800-207 on “Zero Trust Architecture” discusses authorization as a method of reducing implicit trust, and with Machina, authorization is controlled through a patented key release process — even if encryption is not applied — which binds policy to resources, including when they travel beyond network boundaries. Exfiltrated data secured with Machina is of zero use to anyone else.
Data is the central pillar of the Zero Trust eXtended ecosystem framework, and MachinaTM earned the highest marks possible in the criteria of data security and APIs. Start securing what you value with Machina, the developer-first authorization platform of choice.
Learn more about using Machina to prepare, implement, and maintain your ZTX security strategy.