Lexmark XC4342 Security White Paper - Page 6
Zero Trust, and requires a comprehensive understanding of software, hardware, network architecture
View all Lexmark XC4342 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 6 highlights
Zero Trust 6 Zero Trust Zero Trust Zero Trust is a proactive, integrated approach to security across all layers of the digital estate. It explicitly and continuously verifies every transaction, asserts least privilege, and relies on intelligence, advanced detection, and real-time response to threats. Zero Trust is imperative for business, technology, and security teams working to protect everything as it is, and as it could be. It is an ongoing journey for security professionals, but getting started begins with simple first steps, a continuing sense of urgency, and continuous iterative improvements. Zero-trust principles include: • Segmenting and compartmentalizing data • Ensuring endpoint security • Not trusting, always verifying • Least privileged access Lexmark realizes that organizations are considering zero-trust principles to provide tighter access controls, both inside and outside the network perimeter. Securing an enterprise environment is becoming more complex and requires a comprehensive understanding of software, hardware, network architecture, human factors, and each organization's security posture and goals. Lexmark's security strategies support zero-trust infrastructures today with our advanced device management and conformance tools, on-device runtime and firmware protections, and security analysis and analytics services. Lexmark uses a layered approach to provide the protections when considering the many facets of security. Our products include various features that can be tailored to fit our customer's security risk profile using capabilities, such as, core device security, device and data hardening, security solutions and services, and more.