NEW YORK and TEL AVIV, Israel, May 14, 2020 /PRNewswire-PRWeb/ -- Zero Networks, the pioneer in zero trust networking, today announced the release of TrustMeter, a new free tool to help organizations better understand how much excessive network access exists inside their network.
According to Gartner, Inc.: "Excessive network trust leads to excessive latent risk. Network connectivity (even the right to 'ping' or see a server) should not be an entitlement; it should be earned based on trust. This excessive network trust will inevitably be exploited, leading to breaches and bringing legal, financial and regulatory exposure."*
Risk due to excessive employee network access has always been a reality for businesses. However, with many employees working remotely due to COVID-19, this problem is now bigger and more urgent. It is easier to compromise a machine in the home network that is connected to an organization's network than it is to compromise company-owned assets. Add to that the fact that since the start of COVID-19, hacking and phishing attempts have increased by 37% month-over-month, and it's easy to see why organizational networks are at more risk than ever due to that excessive network access users have.
"Users and machines have way more network access than they need or ever should. This means that once an attacker compromises one machine inside the network, it's easy for them to spread and do whatever they want," said Benny Lakunishok, CEO, Zero Networks. "TrustMeter maps this excessive network trust and provides easy-to-consume visibility of this issue to IT and security teams so they can take action."
TrustMeter extracts assets, entity, and identity information, and actively scans all assets to provide detailed information on what is accessible and vulnerable to exploitation. Scans can be run from any machine in the network to determine various scenarios, including:
- -What risks remote workers are introducing to the network (VPN risk)
- -Where an attacker can spread once they have taken control over one client machine inside the network
- -What could be accessed if any server is compromised (data center breach)
Reports collected share complete analysis of each of the above scenarios, including more granular statistics on the composition of IP ranges and assets in the environment. Having a clear view of excessive network access has never been more important, and TrustMeter measures and maps this risk within an organization.
TrustMeter is a free tool that is available now to the community to help measure the risk in every network. The tool is being offered alongside Zero Networks' announcement last month that it is offering its automated network control service free to companies in industries hit hard by COVID-19. To start using TrustMeter, visit the Zero Networks TrustMeter blog at https://zeronetworks.com/blog/introduction-to-trustmeter.
About Zero Networks:
Zero Networks prevents attacks from spreading and causing damage by automatically restricting network access to only what is normally needed, nothing more, for every device across the entire environment. The Zero Networks Access Orchestrator enables organizations to achieve a self-sustaining, zero trust networking stance, with no IT intervention required, by enabling legitimate users to use 2-step verification to access new devices or make rare connections. With Zero Networks, there are zero hassles, disruptions or worries, there is just trust in the network. For more information, please visit http://www.zeronetworks.com or follow Zero Networks on LinkedIn, at https://www.linkedin.com/company/zero-networks, or Twitter, at https://twitter.com/ZeroNetworks.
- *Gartner "Zero Trust Is an Initial Step on the Roadmap to CARTA," Neil MacDonald, 10 December 2018
SOURCE Zero Networks

Share this article