Best Practice Report

Mitigating Ransomware With Zero Trust

Bolster Your Defenses With Zero Trust Principles And Techniques

August 20th, 2021
Steve Turner, null
Steve Turner
Chase Cunningham, null
Chase Cunningham
Josh Zelonis, null
Josh Zelonis
With contributors:
Joseph Blankenship , Chris Sherman , Claire O'Malley , Alexis Tatro , Peggy Dostie

Summary

Ransomware plagues organizations in both developed and developing regions, grinding businesses to a halt and extorting payouts that do not always even unlock the organization’s data. Competent organizations use data integrity measures like mature backup and recovery (as part of a larger disaster recovery plan) and widely-deployed endpoint security to prevent malware like ransomware from spreading. This report includes analysis of common ransomware campaigns, WannaCry, NotPetya, and Darkside to demonstrate that competence in applying Zero Trust strategies and the operation of Zero Trust Extended (ZTX) technologies would mitigate their impact.

Want to read the full report?

Contact us to become a client

This report is available for individual purchase ($1495).

Forrester helps business and technology leaders use customer obsession to accelerate growth. That means empowering you to put the customer at the center of everything you do: your leadership strategy, and operations. Becoming a customer-obsessed organization requires change — it requires being bold. We give business and technology leaders the confidence to put bold into action, shaping and guiding how to navigate today's unprecedented change in order to succeed.