How do you apply a zerotrust security policy to UC?

Image for article How do you apply a zerotrust security policy to UC?
News Source : Techtarget.com

News Summary

  • With a zero-trust security policy, organizations can safeguard user permissions and service within UC platforms
  • This protection covers not just the LAN, but workload communications inside data centers and clouds
  • Microsegmentation policies can isolate services within a data center to prevent unauthorized access or lateral movement threats
Remote and hybrid workforces have placed increased emphasis on the use of unified communications, or UC, services within the enterprise. IT security teams must find a way to protect these sensitive b [+3880 chars]

Must read Articles