Overview

” Zero Trust wasn’t born out of a need to sell another security control or solution. It was born from a desire to solve a real enterprise issues. Zero Trust is focused on simplicity and the reality of how things are now. __ Der. Chase Cunningham, aka “Dr. Zero Trust”.

 

Pelta can help you develop and execute a Zero Trust plan with our Zero Trust Readiness Assessment. Pelta offers a pragmatic assessment to help your organisation understand the extent to which you are ready to adopt zero trust. Our approach leverages Zero Trust principles and a maturity and capability framework applied across key security domains. 

Who can benefit from Zero Trust?

The Zero Trust Readiness Assessment is for organisations of all sizes and supports decision-makers, asset owners and
security practitioners in understanding whether their organisation’s current security baseline will support a move to
zero trust.

How we work?
  • Engagement & Assessment

    Our security experts work with key stakeholders from selected members of your information security team and organisation. The assessment will focus on exploring key controls.

  • Gap Analysis

    After processing of collected data and comparison to the Zero Trust best practice baselines, our team will highlight the Assessment results and associate gaps. Our experts will provide detailed analysis of your assessment scores.

  • Remediate & Build

    Based on the gap analysis results, our experts will provide recommendations for the use of additional controls to remediate the gaps and accelerate the improvement of your security in the identified areas.

  • Operate & Optimize

    Our experts help you operate and continue to enhance the zero trust capabilities across the key security domains.

Service Highlights

 

  • Identity – An identity refers to an attribute or set of attributes that uniquely describe an agency user or entity. Our experts ensure and enforce that the right users and entities have the right access to the right resources at the right time. We ensure identity functions pertaining to zero trust and considerations for Visibility and Analytics, Automation and Orchestration, and Governance within the context of identity.

 

  • Device – A device refers to any hardware asset that can connect to a network, including internet of things (IoT) devices, mobile phones, laptops, servers, and others. A device may be agency-owned or bring-your-own- device (BYOD). Our experts ensures there is an inventory devices, secure all agency devices, and prevent unauthorized devices from accessing resources. 

 

  • Network/Environment – A network refers to an open communications medium, including agency internal networks, wireless networks, and the Internet, used to transport messages. Our experts ensures the segment and control networks and manage internal and external data flows. The networks/environments functions pertaining zero trust, as well as the considerations for Visibility and Analytics, Automation and Orchestration, and Governance within the context of networks/environments.

 

  • Application & Workload – Applications and workloads include agency systems, computer programs, and services that execute on- premise, as well as in a cloud environment. Our expert help you secure and manage the application layer as well as containers and provide secure application delivery. 

 

  • Data – Our experts help you protect data on devices, in applications, and networks. There should be inventory, categorize, and label data, protect data at rest and in transit, and deploy mechanisms for detection data exfiltration.