<img src="https://ad.doubleclick.net/ddm/activity/src=11631230;type=pagevw0;cat=pw_allpg;dc_lat=;dc_rdid=;tag_for_child_directed_treatment=;tfua=;npa=;gdpr=${GDPR};gdpr_consent=${GDPR_CONSENT_755};ord=1;num=1?" width="1" height="1" alt="">

CASE STUDY

The Zero Trust Philosophy at SHE BASH

"At the core of our Zero Trust philosophy is, if you can satisfactorily define the parameters for identity assertion, you achieve higher security assurance."
Cameron Banowsky

Cameron Banowsky
CTO and Facility Security Officer

26-Case Study Images-satellite
SHE BASH Logo
  • INDUSTRY

    IT & Software

  • COMPLIANCE

    CMMC/NIST/DFARS

  • PRODUCTS

    Virtru Private Keystore, Virtru for Google Gmail

See Virtru in Action

For SHE BASH, a defense contractor providing technology and software engineering solutions to federal customers, Zero Trust isn't just a buzzword: It's a core operating principle that underpins its entire organization. 

Watch the video to see how SHE BASH executives Bunny Banowsky, CEO, and Cameron Banowsky, CTO, put their Zero Trust philosophy into practice. 

Ultimately, Zero Trust architectures require continued authentication of the user's identity in order to access sensitive information, whether inside or outside of the perimeter. Virtru supports SHE BASH's Zero Trust posture with data-centric security that reinforces ZT practices. 

As CTO Cameron Banowsky puts it, "Virtru's compelling factor is that data access is bound to identity. Every meaningful response, whether network or data access, requires an identity assertion. This shifts us from traditional perimeter security to a model where we can't trust the environment, but we can enforce authentication parameters to validate identity." 

To learn more about how Virtru empowers organizations to adopt and enforce Zero Trust data access, contact our team for a demo. 

Read transcript Hide transcript
Securing information is today's lifeblood, period. Data and information drives the global economy. If the data or information is compromised, at risk, you know, exploited, I mean, we're talking ultimately about not only a fiscal negative impact, right? But reputations can be ruined.

Personal reputations can be ruined.

Just, time can be wasted.

Just, on and on and on. Right? Without moving in the direction of Zero Trust and staying in the old-school mindset of perimeter boundary paradigm, we are only slowing ourselves down.

At the core of our Zero Trust philosophy is if you can satisfactorily define the parameters for identity assertion, you achieve higher security assurance.

Virtru's compelling factor is that data access is bound to identity.

Every meaningful response, whether network or data access, requires an identity assertion. This shifts us from traditional perimeter security to a model where we can't trust the environment, but we can enforce authentication parameters to validate identity.

And so, Cam mentioned identity, and I say 'yes and.' Yes, identity, and so much more. Right? Point in time, time of day.

IP address, etc. If systems are architected on the assumption of null trust by design, then the system — which is typically a system of systems, right? — by design, it will be one that is the most secure if it assumes null trust, Zero Trust.