Skip to content
11:11 Systems
The Resilient Cloud Platform
11:11 Systems11:11 Systems
  • Why 11:11
    • Submenu
      • Column 1
        • 11:11 Systems Consulting
          Consulting Services
          Global Regions
          Cloud Regions
          11:11 Systems Security
          Security

      • Column 2
        • Cloud Console
          Cloud Console
          Catalyst
          Planning and Assessment
          Compliance
          Compliance

      • WHY CHOOSE 11:11
      • Overview
      • Leadership
      • News & Media
      • ESG Program
      •  
      • Careers
      • Technology Partners
      • Customer Stories
      • Innovation Blog
  • Products & Services
    • Products & Services

        • Cloud Overview
        • Managed Public Cloud
        • Private Cloud
        • Object Storage
        • Cloud Labs
        • Flexible Cloud Environment/Colocation
        • AWS Solutions
        • Managed OS Services
        • Managed DB Services

        Infrastructure as a Service

        Take a 30-day free trial of 11:11 Cloud.

        Cloud hosting built for your business.
        START FREE TRIAL
        REQUEST A QUOTE

        • Backup Overview
        • Veeam Backup
        • Microsoft 365 Backup
        • Managed Backup for Cohesity
        • Cyber Vault
        • Data Protection Services
        Backup as a Service

        11:11 Cloud Backup

        Protect your data wherever it lives.
        REQUEST A QUOTE
        REQUEST A DEMO

        • DRaaS Overview
        • DRaaS for Veeam
        • DRaaS for Zerto
        • DRaaS for Azure
        • DRaaS for Cohesity
        • Managed Recovery
        • Cloud Recovery
        • Cyber Recovery Platform
        • Infrastructure Recovery
        • Continuity Consulting Services
        • Disaster Recovery Consulting
        Disaster Recovery

        5TB 30Day Free Trial of DRaaS for Veeam

        Protect your business-critical workloads and reduce recovery time with the Leader in Disaster Recovery.
        START FREE TRIAL
        LEARN MORE

        • Security Overview
        • Continuous Risk Scanning
        • Managed Detection and Response
        • Managed SIEM
        • Managed EDR
        • Managed Firewall
        • Application and Zero Trust Services
        Security Services

        Take the first steps toward cyber resilience.

        Download our white paper and learn how to stay ahead of threats.
        REQUEST A QUOTE
        DOWNLOAD NOW

        • Networking Overview
        • SD-WAN
        • Managed Connectivity for AWS Direct Connect
        • Multi-Cloud Connect
        • Network Consulting Services
        Connectivity Services

        Transform your network.

        Take your infrastructure and performance to the next level.
        REQUEST A QUOTE
        WATCH VIDEO
  • Solutions
    • Solutions Submenu
      • INDUSTRY
      • Education
      • Financial
      • Government
      • Healthcare
    • Solutions Business Objective Submenu
      • BUSINESS OBJECTIVE
      • Cyber Resilience
      • Modernize
      • Protect
  • Partners
    • Partners Submenu
      • Overview
      • Become a Partner
      • Partner Portals
  • Resources
    • Resources Submenu
      • Events
      • Webinars
      • News & Media
      • White Papers
      • Podcast
      • Data Sheets
      • Customer Stories
      • Innovation Blog
  • Support
    • Support Submenu
      • Contact Support
      • Product Documentation
      • API Documentation
Search:
  • Login
  • Contact
Header Right Menu
Free Trial
  • Why 11:11
    • Consulting Services
    • Cloud Console
    • Cloud Regions
    • Planning and Assessment
    • Security
    • Compliance
    • WHY CHOOSE 11:11
    • Overview
    • Leadership
    • News & Media
    • ESG Program
    • Careers
    • Technology Partners
    • Customer Stories
    • Blog
  • Products & Services
    • CLOUD
    • Cloud Overview
    • Managed Public Cloud
    • Private Cloud
    • Object Storage
    • Cloud Labs
    • Flexible Cloud Environment/Colocation
    • AWS Solutions
    • Managed OS Services
    • Managed DB Services
    • BACKUP
    • Backup Overview
    • Veeam Backup
    • Microsoft 365 Backup
    • Managed Backup for Cohesity
    • Cyber Vault
    • Data Protection Services
    • DISASTER RECOVERY
    • DRaaS Overview
    • DRaaS for Veeam
    • DRaaS for Zerto
    • DRaaS for Azure
    • DRaaS for Cohesity
    • Managed Recovery
    • Cloud Recovery
    • Cyber Recovery Platform
    • Infrastructure Recovery Services
    • Continuity Consulting
    • Disaster Recovery Consulting
    • SECURITY
    • Security Overview
    • Continuous Risk Scanning
    • Managed Detection and Response
    • Managed SIEM
    • Managed EDR
    • Managed Firewall
    • Application and Zero Trust Services
    • NETWORK
    • Network Overview
    • SD-WAN
    • Managed Connectivity for AWS Direct Connect
    • Multi Cloud Connect
    • Managed IP
  • Solutions
    • INDUSTRY
    • Education
    • Financial
    • Government
    • Healthcare
    • BUSINESS OBJECTIVE
    • Cyber Resilience
    • Modernize
    • Protect
  • Partners
    • Overview
    • Become a Partner
    • Partner Portals
  • Resources
    • Events
    • Webinars
    • News & Media
    • Whitepapers
    • Podcast
    • Datasheets
    • Customer Stories
    • Innovation Blog
  • Support
    • Contact Support
    • Product Documentation
    • API Documentation
  • Contact
  • Login
  • Free Trial
Author: Justin Augat
Date: December 14, 2019

Does Your Cloud Provider Support Zero Trust?

As of January 2022, iland is now 11:11 Systems, a managed infrastructure solutions provider at the forefront of cloud, connectivity, and security. As a legacy iland.com blog post, this article likely contains information that is no longer relevant. For the most up-to-date product information and resources, or if you have further questions, please refer to the 11:11 Systems Success Center or contact us directly.

 
For years, cybersecurity was a niche skill that most IT professionals were comfortable ignoring. If customers wanted to know more about a given security capability with a software or service offering, most of us would have gone directly to our security and compliance specialist for the answer, or more likely, made an introduction directly to the customer. At the time, security wasn’t the headline or the differentiator. It was an afterthought on the “digital transformation” journey.

That was then. Today, it’s clear that times have changed. If you are an IT developer, buyer, or someone who can be impacted by cybercrime (which is basically all of us), having a cursory understanding of data security is now a requisite part of the job. Otherwise, you could be putting yourself or your company at risk. To illustrate this changed environment, just look at the last year:

  • According to Risk Based Security: “There have been 3,813 breaches reported through June 30, exposing over 4.1 billion records. Compared to the midyear of 2018, the number of reported breaches was up 54 percent and the number of exposed records was up 52 percent. Already in 2019, three breaches have made the list for the 10 largest breaches of all time.”

  • According to Cybersecurity Ventures: “Cybercrime is the greatest threat to every company in the world, and one of the biggest problems with mankind. Cybercrime will cost the world $6 trillion annually by 2021, up from $3 trillion in 2015. This represents the greatest transfer of economic wealth in history, risks the incentives for innovation and investment, and will be more profitable than the global trade of all major illegal drugs combined.”

Cybercrime bad news – and good news

Indeed, 2019 was a year for the cybercrime record books. The above has translated into a lot of bad news and difficult conversations between customers and IT professionals.

Now, for the good news. As you read this, our cybersecurity capabilities continue to improve. Cybercrime is getting more attention than ever (the first step in resolving a problem is to admit it exists), organizations are getting smarter (security spending is on the rise), and cybersecurity strategies are getting more advanced and focused.

However, it’s fair to say that as we get better at defense, cybercriminals are also getting better at offense. It’s for this reason that many customers are evolving from a tactical security strategy (technology and service-based approach) to a Zero Trust approach that incorporates technology, services, people, and processes, into a cohesive approach that includes multiple layers of defense.

The greatest security vulnerability in IT? Trust.

To understand the need for Zero Trust, consider that today many of us have been conditioned to view internal networks (accessed via password) as safe and external networks as potentially harmful. We assume this through a “trust and verify” approach that says once your identity and permission to access the internal network are verified, trust is considered established. Oftentimes, this means automatic access to other systems inside the secure perimeter. Unfortunately, it’s also when we let our guard down and a motion that bad actors rely on to strike and exploit IT vulnerabilities.

Because of this risk, smart organizations are now replacing Trust and Verify with Zero Trust. Zero Trust changes our assumptions that employees, systems, and services operating from within the secure environment can automatically be trusted. Instead, Zero Trust verifies anyone (or anything) that attempts to connect to any system before granting access. To put it in the context of a common analogy, if you enter your house through the front door, you expect to have access to all the rooms inside. In a Zero Trust world, you would not necessarily have access to all rooms automatically. In fact, you may not be able to go beyond your entryway without further permission.

This year alone there have been countless examples of malicious insiders taking advantage of valid credentials and doing great damage from within companies. Add the absolutely huge risk associated with external security threats (ransomware, malware, etc) that seems to grow daily, and you can see why customers are pursuing Zero Trust strategies in their IT organizations.

11:11 Systems recently had the opportunity to host a webinar on Zero Trust with our partner, and security-industry leader, Trend Micro. You can replay the webinar here. If you would prefer to read through 11:11’s approach to Zero Trust, we have a new white paper available here.

In both cases, you will learn how a Zero Trust strategy in your organization can eliminate many of the vulnerabilities that are left behind by technology implementations alone. As we wind down 2019 we focus on what 2020 will bring, it’s important to acknowledge that cybercrime is growing in numbers, impact, and sophistication. That doesn’t mean we are helpless, but it does mean we need to change. A Zero Trust strategy can help with that.

 

Categories: Cybercrime, SecurityBy Justin AugatDecember 14, 2019

Author: Justin Augat

Justin Augat worked on the 11:11 Systems product marketing team.

Post navigation

PreviousPrevious post:Don’t Waste Time on Proofs of Concepts that Never WorkNextNext post:11:11 Systems Q&A: Is a roadmap really necessary when navigating the cloud for the first time?

Related Posts

Digital Operational Resilience Act (DORA)
Helping the Financial Sector Deliver Secure and Modern Infrastructure through Regulation
July 10, 2025
vulnerability management
A Modern Approach to Managing Vulnerabilities
May 30, 2025
Cyber Resilience
Data Protection vs. Cyber Resilience: Mastering Both in the Complex World of Gambling
May 27, 2025
Cyber Resilience
Reimagining Cyber Resilience in the Gambling Industry: A Strategic Imperative for the Digital Age
May 13, 2025
effective passwords
Creating Effective Password Policies in Your Organization
May 5, 2025
World Password Day 2025
10 Tips for Strengthening Enterprise Security this World Password Day  
April 30, 2025
PRODUCTS & SERVICES
  • Cloud
  • Backup
  • Disaster Recovery
  • Managed Security
  • Network as a Service
  • Compliance
COMPANY
  • Why 11:11
  • Customer Stories
  • Careers
  • Leadership
  • Technology Partners
  • News & Media
  • Contact Support
CLOUD REGIONS
  • North America
  • EMEA
  • APAC
CONNECT
  • LinkedIn
  • X
  • Youtube

© 2025 11:11 Systems Inc., All Rights Reserved | Privacy Notice | Website Terms of Use |

Go to Top