Enterprise - Zero Trust Strategy & Journey Map

John Keells Information Technology Pvt Ltd

Organizations need a new security model that more effectively adapts to the complexity of the modern environment, embraces the hybrid & multi-cloud workplace, and ensures cyber security assurance.

John Keells, IT has an established Zero Trust practice to provide Cloud Security service to local and international clients.  We have helped organizations to commence the Zero Trust Strategy & journey and have maintained Cloud Security Best practices with them. By the year 2021 we were able to complete Zero Trust deployment by covering all six pillars (Identity, Device, Network, Application, Data, Infrastructure) for the largest conglomerate (Retail, transportation, Leisure, Finance and Insurance, Property, IT) company in Sri Lanka.

Our holistic approach to Zero Trust will extend to your entire digital estate. Zero Trust architecture serves as a comprehensive end-to-end strategy and that will provide you Integration across all the elements. To help your firm attain its intended Zero Trust state, John Keells IT will leverage the existing maturity to create a strategy and roadmap that includes planning, budgeting, prioritization, time management, and the implementation of strategic initiatives using the following Microsoft tools and more.

Respective Tools for Zero Trust Pillars

Identity - Azure Active Directory, Azure Active Directory Identity Protection. Defender for Identity, Endpoints - Microsoft Intune, Defender for Endpoint Data - Microsoft Purview, Defender for Office 365 Infra - Defender for Cloud, Azure Monitor,Update Management Center, Apps - Defender for Cloud Apps Network - Azure Bastion, Azure Front Door,Application Gateway,Azure DDoS Protection,Network Watcher