{"id":19991,"date":"2021-11-18T19:02:48","date_gmt":"2021-11-18T19:02:48","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=19991"},"modified":"2021-11-30T19:13:36","modified_gmt":"2021-11-30T19:13:36","slug":"cybersecurity-mesh-decentralized-identity-emerging-security-technology","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/networks\/cybersecurity-mesh-decentralized-identity-emerging-security-technology\/","title":{"rendered":"Cybersecurity Mesh, Decentralized Identity Lead Emerging Security Technology: Gartner"},"content":{"rendered":"<p>New cybersecurity buzzwords are always in abundance at the Gartner Security &amp; Risk Management Summit, and the concepts that took center stage this week, like cybersecurity mesh and decentralized identity, seem well suited for new threats that have exploded onto the scene in the last year.<\/p>\n<p>Gartner analyst Ruggero Contu noted that security risks are becoming external: the <a href=\"https:\/\/www.esecurityplanet.com\/compliance\/sbom\/\">software supply chain<\/a>, the public <a href=\"https:\/\/www.esecurityplanet.com\/cloud\/cnap-platforms-the-next-evolution-of-cloud-security\/\">cloud<\/a>, the trading of breached data, and <a href=\"https:\/\/www.esecurityplanet.com\/mobile\/eu-iot-wireless-device-security\/\">IoT<\/a> and <a href=\"https:\/\/www.esecurityplanet.com\/networks\/critical-infrastructure-protection-physical-cybersecurity\/\">operational technology<\/a> (OT) are all threats outside of traditional <a href=\"https:\/\/www.esecurityplanet.com\/networks\/network-firewalls\/\">perimeter security<\/a>.<\/p>\n<p>Those threats are inspiring innovations in security technology, chief among them the security mesh, which has at its core distributed policy enforcement and &#8220;pluggable, composable tools that can be plugged anywhere into the mesh,&#8221; Contu said.<\/p>\n<p>He said security mesh fabric enabler technology uses foundational services such as:<\/p>\n<ul>\n<li>Centralized policy management and orchestration<\/li>\n<li>Security analytics, intelligence and triggers<\/li>\n<li>A distributed identity fabric<\/li>\n<\/ul>\n<h2>What is Cybersecurity Mesh?<\/h2>\n<p>Gartner analyst Felix Gaehtgens said the security mesh is still a strategy rather than a defined architecture, but he said the concept better aligns organizations with threats: &#8220;Attackers don\u2019t think in silos. Organizations do,&#8221; he noted.<\/p>\n<p>By 2024, Gaehtgens predicted that security mesh technology will lead to huge savings in the cost of breaches. &#8220;Organizations adopting a cybersecurity mesh architecture to integrate security tools to work as a cooperative ecosystem will reduce the financial impact of individual security incidents by an average of 90%,&#8221; he said.<\/p>\n<p>Instead of <a href=\"https:\/\/www.esecurityplanet.com\/products\/siem-tools\/\">SIEM<\/a> and <a href=\"https:\/\/www.esecurityplanet.com\/networks\/soar\/\">SOAR<\/a> integrating security tools, the security mesh will use security analytics and intelligence, he said. The mesh will also include identity, policy, posture and dashboard layers.<\/p>\n<figure id=\"attachment_20006\" aria-describedby=\"caption-attachment-20006\" style=\"width: 900px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-20006\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2021\/11\/gartner-security-mesh-scaled-e1637264959458.jpg\" alt=\"cybersecurity mesh\" width=\"900\" height=\"501\" \/><figcaption id=\"caption-attachment-20006\" class=\"wp-caption-text\">Cybersecurity mesh architecture (Source: Gartner)<\/figcaption><\/figure>\n<p>Cybersecurity mesh architecture, or CSMA, &#8220;is more than XDR,&#8221; Gaehtgens said.<\/p>\n<p><a href=\"https:\/\/www.esecurityplanet.com\/threats\/xdr-emerges-as-a-key-next-generation-security-tool\/\">XDR, or extended detection and response<\/a>, has emerged as a new way for security vendors to tie their products together in a unified platform. Gaehtgens said XDR is a &#8220;potential foundation&#8221; for the security analytics and intelligence that CSMA requires, as are SIEM and SOAR, which &#8220;can add value&#8221; to the security analytics\/intelligence layer in a security mesh.<\/p>\n<p>He called <a href=\"https:\/\/www.esecurityplanet.com\/networks\/sase\/\">secure access service edge (SASE)<\/a> technology &#8220;a meshy approach of delivering distinct functions in an integrated manner,&#8221; but the security mesh has &#8220;a broader scope.&#8221;<\/p>\n<p>A number of <a href=\"https:\/\/www.esecurityplanet.com\/products\/top-cybersecurity-companies\/\">cybersecurity companies<\/a> have CSMA-like approaches today, he said, among them Fortinet, IBM, McAfee, Microsoft, Palo Alto Networks and Broadcom-Symantec. Those platforms &#8220;can provide benefit and scale and cost in the intermediate term,&#8221; but have the potential for vendor lock-in and lack of interoperability.<\/p>\n<p>Gaehtgens recommended that organizations start building the supportive layers for a cybersecurity mesh strategy, including security analytics, identity fabric, policy management, and dashboards. Distributed security technologies offering interoperability will be key to the security mesh, so users should evaluate features such as inversion of control APIs, standards support, and extensible analytics.<\/p>\n<p>He\u00a0also told conference attendees to &#8220;familiarize yourself with current and emerging standards, and open source code projects as a potential alternative to supplement vendor interoperability gaps.&#8221; He listed more than 20:<\/p>\n<figure id=\"attachment_19995\" aria-describedby=\"caption-attachment-19995\" style=\"width: 900px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-19995\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2021\/11\/security-standards-scaled-e1637260744285.jpg\" alt=\"security standards\" width=\"900\" height=\"493\" \/><figcaption id=\"caption-attachment-19995\" class=\"wp-caption-text\">Security standards (Source: Gartner)<\/figcaption><\/figure>\n<p>See also: <a href=\"https:\/\/www.esecurityplanet.com\/products\/xdr-security-solutions\/\">Top XDR Security Solutions<\/a><\/p>\n<h2>What is Decentralized Identity?<\/h2>\n<p>Decentralized identity will be key to the security mesh. Contu said that under decentralized identity, identities are linked to system elements, with a low reliance on centralized identity (see image below).<\/p>\n<figure id=\"attachment_19997\" aria-describedby=\"caption-attachment-19997\" style=\"width: 900px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-19997\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2021\/11\/decentralized-identity-e1637260857303.jpg\" alt=\"decentralized identity\" width=\"900\" height=\"409\" \/><figcaption id=\"caption-attachment-19997\" class=\"wp-caption-text\">Decentralized identity architecture (Source: Gartner)<\/figcaption><\/figure>\n<p>Traditional <a href=\"https:\/\/www.esecurityplanet.com\/products\/best-iam-software\/\">identity and access management (IAM)<\/a> has &#8220;issues with security, scalability, reliability and privacy,&#8221; Contu said. [Gartner analyst Peter Firstbrook later noted that IAM has itself become a target in credential theft and other attack techniques.]<\/p>\n<p>However, decentralized identity is as yet an &#8220;unproven technology,&#8221; held back by Blockchain\u00a0 understanding and skills and the difficulty of assessing risks across Blockchain services.<\/p>\n<p>Also read: <a href=\"https:\/\/www.esecurityplanet.com\/applications\/cybersecurity-blockchain-applications\/\">The State of Blockchain Applications in Cybersecurity<\/a><\/p>\n<h2>Where Security Buyers Are At<\/h2>\n<p>Contu said the technologies buyers are interested in now include OT security, cloud workload protection, cloud security posture management, and <a href=\"https:\/\/www.esecurityplanet.com\/products\/best-user-and-entity-behavior-analytics-ueba-tools\/\">behavior monitoring<\/a>, with integrated and digital risk management, <a href=\"https:\/\/www.esecurityplanet.com\/products\/container-and-kubernetes-security-vendors\/\">container<\/a>-based network defense, <a href=\"https:\/\/www.esecurityplanet.com\/applications\/microsoft-expands-passwordless-sign-on-to-all-accounts\/\">passwordless authentication<\/a>, SASE and <a href=\"https:\/\/www.esecurityplanet.com\/products\/zero-trust-security-solutions\/\">zero trust networking<\/a> gaining traction in the next one to three years.<\/p>\n<p>Contu recommended that organizations &#8220;position the enterprise for a more secure future by choosing cybersecurity technologies that offer high levels of integration capability. The security of the composable enterprise requires flexible cybersecurity mechanisms with a rich set of APIs, based on interoperability standards.&#8221;<\/p>\n<p>Buyers need to rethink network and server security priorities and &#8220;invest in solutions that are truly designed for cloud first and zero trust,&#8221; he said.<\/p>\n<p>Lastly, he said, organizations should invest in people, process and organizational change to address the expanding role of security to address &#8220;external threats, digital trust and safety that arise from the digitalization of business.&#8221;<\/p>\n<p>See also: <a href=\"https:\/\/www.esecurityplanet.com\/products\/zero-trust-security-solutions\/\">Best Zero Trust Security Solutions<\/a><\/p>\n<h2>Supply Chain Threats to Grow<\/h2>\n<p>Firstbrook said in a press briefing at the conference that by 2025, 45% of organizations worldwide will have experienced attacks on their software supply chains, a three-fold increase from 2021.<\/p>\n<p>He listed nine supply chain attack methods and some of their victims:<\/p>\n<ul>\n<li>Authenticated partner compromise (Target, <a href=\"https:\/\/www.esecurityplanet.com\/threats\/advanced-persistent-threat\/\">Stuxnet<\/a>)<\/li>\n<li>Outsourced IT based attacks (<a href=\"https:\/\/www.esecurityplanet.com\/threats\/kaseya-ransomware-arrest\/\">Kaseya<\/a>, CloudStar)<\/li>\n<li>Source code modification (<a href=\"https:\/\/www.esecurityplanet.com\/threats\/solarwinds-attackers-targeting-resellers-service-providers\/\">SolarWinds<\/a>, <a href=\"https:\/\/www.esecurityplanet.com\/threats\/ransomware-protection\/\">NotPetya<\/a>, CC cleaner)<\/li>\n<li>Modified applications in production (Web CC scraping)<\/li>\n<li>Stolen Certificates (Codecov, <a href=\"https:\/\/www.esecurityplanet.com\/networks\/\">Bit9<\/a>, Mimecast)<\/li>\n<li>Stolen source code (RSA)<\/li>\n<li>Open-source code components (RubyGems)<\/li>\n<li>App store and browser plug in trojans (Exodus, Great Suspender)<\/li>\n<\/ul>\n<p><a href=\"https:\/\/www.esecurityplanet.com\/applications\/how-to-control-api-security-risks\/\">APIs<\/a> are a growing target and often ignored attack point, Firstbrook said.<\/p>\n<p>Also read: <a href=\"https:\/\/www.esecurityplanet.com\/threats\/common-it-security-vulnerabilities-how-to-prevent-them\/\">The Biggest Lessons about Vulnerabilities at RSAC 2021<\/a><\/p>\n<h2>Endpoint Security &#8216;Critical&#8217;<\/h2>\n<p>Firstbrook called endpoint detection and remediation &#8220;critical first responder tools, even if they fail to detect the initial intrusion.&#8221;<\/p>\n<p><a href=\"https:\/\/www.esecurityplanet.com\/products\/edr-solutions\/\">Endpoint security tools<\/a> are a cornerstone of IT security, and Firstbrook said he expected the market to grow 26% to $16 billion this year.<\/p>\n<p>Firstbrook noted that the &#8220;the configuration of security products is as important as the quality of the product.&#8221; Among his recommendations, he said &#8220;developer machines must be secured&#8221; and that &#8220;privileged servers must be profiled and the behavior monitored.&#8221;<\/p>\n<p>See also: <a href=\"https:\/\/www.esecurityplanet.com\/products\/edr-solutions\/\">Top Endpoint Detection &amp; Response (EDR) Solutions<\/a><\/p>\n<h2>Ransomware Attacks and Defense<\/h2>\n<p>Gartner analyst Jon Amato discussed ransomware defenses. His slides on the anatomy of ransomware attacks and ransomware data protection strategies are worth reproducing here:<\/p>\n<figure id=\"attachment_19998\" aria-describedby=\"caption-attachment-19998\" style=\"width: 900px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-19998\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2021\/11\/gartner-ransomware-attack-scaled-e1637261218371.jpg\" alt=\"Anatomy of a ransomware attack\" width=\"900\" height=\"490\" \/><figcaption id=\"caption-attachment-19998\" class=\"wp-caption-text\">Anatomy of a ransomware attack (Source: Gartner)<\/figcaption><\/figure>\n<figure id=\"attachment_20001\" aria-describedby=\"caption-attachment-20001\" style=\"width: 900px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-20001\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2021\/11\/gartner-ransomware-backup-scaled-e1637261393231.jpg\" alt=\"ransomware defenses\" width=\"900\" height=\"502\" \/><figcaption id=\"caption-attachment-20001\" class=\"wp-caption-text\">Ransomware defenses (Source: Gartner)<\/figcaption><\/figure>\n<p>Further reading:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.esecurityplanet.com\/products\/ransomware-removal-and-recovery-services\/\">Best Ransomware Removal and Recovery Services<\/a><\/li>\n<li><a href=\"https:\/\/www.esecurityplanet.com\/products\/best-backup-solutions-for-ransomware-protection\/\">Best Backup Solutions for Ransomware Protection<\/a><\/li>\n<\/ul>\n\n\n<div id=\"ta-campaign-widget-66d6ef9ed19eb-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6ef9ed19eb\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6ef9ed19eb\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6ef9ed19eb\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6ef9ed19eb\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6ef9ed19eb\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6ef9ed19eb\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>New cybersecurity buzzwords are always in abundance at the Gartner Security &amp; Risk Management Summit, and the concepts that took center stage this week, like cybersecurity mesh and decentralized identity, seem well suited for new threats that have exploded onto the scene in the last year. Gartner analyst Ruggero Contu noted that security risks are [&hellip;]<\/p>\n","protected":false},"author":163,"featured_media":19998,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[19,14,15,16],"tags":[30577,14404,3414,30576],"b2b_audience":[33],"b2b_industry":[],"b2b_product":[31778,378,377,384,31790],"class_list":["post-19991","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-endpoint","category-networks","category-threats","category-trends","tag-edge-security","tag-endpoint-security","tag-network-security","tag-sase","b2b_audience-awareness-and-consideration","b2b_product-blockchain","b2b_product-endpoint-security","b2b_product-gateway-and-network-security","b2b_product-identity-management-privacy","b2b_product-ransomware"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cybersecurity Mesh and Decentralized Identity Explained<\/title>\n<meta name=\"description\" content=\"Cybersecurity threats became far more dangerous in 2021. Security technology is rising to the challenge, with security mesh leading the way.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/networks\/cybersecurity-mesh-decentralized-identity-emerging-security-technology\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity Mesh and Decentralized Identity Explained\" \/>\n<meta property=\"og:description\" content=\"Cybersecurity threats became far more dangerous in 2021. Security technology is rising to the challenge, with security mesh leading the way.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/networks\/cybersecurity-mesh-decentralized-identity-emerging-security-technology\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2021-11-18T19:02:48+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-11-30T19:13:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/11\/gartner-ransomware-attack-scaled-e1637261218371.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"900\" \/>\n\t<meta property=\"og:image:height\" content=\"490\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Paul Shread\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Paul Shread\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/cybersecurity-mesh-decentralized-identity-emerging-security-technology\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/cybersecurity-mesh-decentralized-identity-emerging-security-technology\/\"},\"author\":{\"name\":\"Paul Shread\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/ff409b3839bb3ee2e8f2a1ec6f4d6d04\"},\"headline\":\"Cybersecurity Mesh, Decentralized Identity Lead Emerging Security Technology: Gartner\",\"datePublished\":\"2021-11-18T19:02:48+00:00\",\"dateModified\":\"2021-11-30T19:13:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/cybersecurity-mesh-decentralized-identity-emerging-security-technology\/\"},\"wordCount\":1077,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/cybersecurity-mesh-decentralized-identity-emerging-security-technology\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/11\/gartner-ransomware-attack-scaled-e1637261218371.jpg\",\"keywords\":[\"edge security\",\"endpoint security\",\"network security\",\"sase\"],\"articleSection\":[\"Endpoint\",\"Networks\",\"Threats\",\"Trends\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/cybersecurity-mesh-decentralized-identity-emerging-security-technology\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/networks\/cybersecurity-mesh-decentralized-identity-emerging-security-technology\/\",\"name\":\"Cybersecurity Mesh and Decentralized Identity Explained\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/cybersecurity-mesh-decentralized-identity-emerging-security-technology\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/cybersecurity-mesh-decentralized-identity-emerging-security-technology\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/11\/gartner-ransomware-attack-scaled-e1637261218371.jpg\",\"datePublished\":\"2021-11-18T19:02:48+00:00\",\"dateModified\":\"2021-11-30T19:13:36+00:00\",\"description\":\"Cybersecurity threats became far more dangerous in 2021. Security technology is rising to the challenge, with security mesh leading the way.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/cybersecurity-mesh-decentralized-identity-emerging-security-technology\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/networks\/cybersecurity-mesh-decentralized-identity-emerging-security-technology\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/cybersecurity-mesh-decentralized-identity-emerging-security-technology\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/11\/gartner-ransomware-attack-scaled-e1637261218371.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/11\/gartner-ransomware-attack-scaled-e1637261218371.jpg\",\"width\":900,\"height\":490,\"caption\":\"Anatomy of a ransomware attack (Source: Gartner)\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/cybersecurity-mesh-decentralized-identity-emerging-security-technology\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Mesh, Decentralized Identity Lead Emerging Security Technology: Gartner\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/ff409b3839bb3ee2e8f2a1ec6f4d6d04\",\"name\":\"Paul Shread\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/09\/EDITED-HH-85962095_Paul_Shread_20220906_144803_edited-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/09\/EDITED-HH-85962095_Paul_Shread_20220906_144803_edited-150x150.jpg\",\"caption\":\"Paul Shread\"},\"description\":\"Former eSecurityPlanet Editor Paul Shread has covered nearly every aspect of enterprise technology in his 20+ years in IT journalism, including award-winning articles on endpoint security and virtual data centers. He wrote a column on small business technology for Time.com, and covered financial markets for 10 years, from the dot-com boom and bust to the 2007-2009 financial crisis. He holds market analyst and cybersecurity certifications. In a previous life he worked for daily newspapers, including the Baltimore Sun, and spent 7 years covering the federal government. Al Haig once compared him to Bob Woodward (true story - just ask Google).\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/paul-shread-2\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity Mesh and Decentralized Identity Explained","description":"Cybersecurity threats became far more dangerous in 2021. Security technology is rising to the challenge, with security mesh leading the way.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/networks\/cybersecurity-mesh-decentralized-identity-emerging-security-technology\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity Mesh and Decentralized Identity Explained","og_description":"Cybersecurity threats became far more dangerous in 2021. Security technology is rising to the challenge, with security mesh leading the way.","og_url":"https:\/\/www.esecurityplanet.com\/networks\/cybersecurity-mesh-decentralized-identity-emerging-security-technology\/","og_site_name":"eSecurity Planet","article_published_time":"2021-11-18T19:02:48+00:00","article_modified_time":"2021-11-30T19:13:36+00:00","og_image":[{"width":900,"height":490,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/11\/gartner-ransomware-attack-scaled-e1637261218371.jpg","type":"image\/jpeg"}],"author":"Paul Shread","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Paul Shread","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/networks\/cybersecurity-mesh-decentralized-identity-emerging-security-technology\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/cybersecurity-mesh-decentralized-identity-emerging-security-technology\/"},"author":{"name":"Paul Shread","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/ff409b3839bb3ee2e8f2a1ec6f4d6d04"},"headline":"Cybersecurity Mesh, Decentralized Identity Lead Emerging Security Technology: Gartner","datePublished":"2021-11-18T19:02:48+00:00","dateModified":"2021-11-30T19:13:36+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/cybersecurity-mesh-decentralized-identity-emerging-security-technology\/"},"wordCount":1077,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/cybersecurity-mesh-decentralized-identity-emerging-security-technology\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/11\/gartner-ransomware-attack-scaled-e1637261218371.jpg","keywords":["edge security","endpoint security","network security","sase"],"articleSection":["Endpoint","Networks","Threats","Trends"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/networks\/cybersecurity-mesh-decentralized-identity-emerging-security-technology\/","url":"https:\/\/www.esecurityplanet.com\/networks\/cybersecurity-mesh-decentralized-identity-emerging-security-technology\/","name":"Cybersecurity Mesh and Decentralized Identity Explained","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/cybersecurity-mesh-decentralized-identity-emerging-security-technology\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/cybersecurity-mesh-decentralized-identity-emerging-security-technology\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/11\/gartner-ransomware-attack-scaled-e1637261218371.jpg","datePublished":"2021-11-18T19:02:48+00:00","dateModified":"2021-11-30T19:13:36+00:00","description":"Cybersecurity threats became far more dangerous in 2021. Security technology is rising to the challenge, with security mesh leading the way.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/cybersecurity-mesh-decentralized-identity-emerging-security-technology\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/networks\/cybersecurity-mesh-decentralized-identity-emerging-security-technology\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/networks\/cybersecurity-mesh-decentralized-identity-emerging-security-technology\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/11\/gartner-ransomware-attack-scaled-e1637261218371.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/11\/gartner-ransomware-attack-scaled-e1637261218371.jpg","width":900,"height":490,"caption":"Anatomy of a ransomware attack (Source: Gartner)"},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/networks\/cybersecurity-mesh-decentralized-identity-emerging-security-technology\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Mesh, Decentralized Identity Lead Emerging Security Technology: Gartner"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/ff409b3839bb3ee2e8f2a1ec6f4d6d04","name":"Paul Shread","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/09\/EDITED-HH-85962095_Paul_Shread_20220906_144803_edited-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/09\/EDITED-HH-85962095_Paul_Shread_20220906_144803_edited-150x150.jpg","caption":"Paul Shread"},"description":"Former eSecurityPlanet Editor Paul Shread has covered nearly every aspect of enterprise technology in his 20+ years in IT journalism, including award-winning articles on endpoint security and virtual data centers. He wrote a column on small business technology for Time.com, and covered financial markets for 10 years, from the dot-com boom and bust to the 2007-2009 financial crisis. He holds market analyst and cybersecurity certifications. In a previous life he worked for daily newspapers, including the Baltimore Sun, and spent 7 years covering the federal government. Al Haig once compared him to Bob Woodward (true story - just ask Google).","url":"https:\/\/www.esecurityplanet.com\/author\/paul-shread-2\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/19991"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/163"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=19991"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/19991\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/19998"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=19991"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=19991"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=19991"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=19991"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=19991"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=19991"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}