Access Management , Identity & Access Management , Security Operations

Access and Identity: With 'Zero Trust,' Less Is More

Marku Rossi of SSH Communications Security on Delivering Right Access Privileges at Right Time
Markku Rossi, CTO, SSH Communications Security

More organizations are applying a highly automated "zero trust" model to ensure that they only give the right amount of privilege to the right user for the right amount of time, says Markku Rossi, CTO of SSH.com.

See Also: Cloud Identity Security and the Power of PAM

In a video interview at Information Security Media Group's recent Cybersecurity Summit in New York, Rossi also discusses:

  • Top access control challenges facing organizations;
  • How to manage access to critical data in complex on-premises and cloud IT networks;
  • How to log and audit every session for traceability, auditability and compliance.

Rossi, CTO of SSH Communications Security, leads the company's R&D and technology strategy. He has nearly 25 years of software engineering and architecture experience, formerly serving as SSH's chief engineer and as a major contributor to its software architecture. Earlier, he co-founded several companies, including Codento and ShopAdvisor, and served as CTO of Navicore and chief architect at Nokia.


About the Author

Mathew J. Schwartz

Mathew J. Schwartz

Executive Editor, DataBreachToday & Europe, ISMG

Schwartz is an award-winning journalist with two decades of experience in magazines, newspapers and electronic media. He has covered the information security and privacy sector throughout his career. Before joining Information Security Media Group in 2014, where he now serves as the executive editor, DataBreachToday and for European news coverage, Schwartz was the information security beat reporter for InformationWeek and a frequent contributor to DarkReading, among other publications. He lives in Scotland.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.