{"componentChunkName":"component---src-pages-markdown-remark-fields-slug-js","path":"/identity/3-stages-gartner-carta-it-security/","result":{"data":{"markdownRemark":{"id":"e4f92c29-0780-527c-a283-cb32029e5eaf","excerpt":"IT security is becoming an integral part of a business’s overall success amid the digitally advanced ecosystems where security breaches are just a loophole away…","html":"<p>IT security is becoming an integral part of a business’s overall success amid the digitally advanced ecosystems where security breaches are just a loophole away. </p>\n<p>CARTA (Continuous Adaptive Risk and Trust Assessment) is a new and efficient IT security approach introduced by Gartner in 2017 that helps cybersecurity experts ensure a stringent mechanism to handle vulnerabilities. </p>\n<p>Businesses embarking on a <a href=\"https://www.loginradius.com/blog/identity/digital-transformation-consumer-iam/\">digital transformation journey</a> shouldn’t overlook security since data breaches cause losses worth millions of dollars every year and eventually tarnishes brand repute. </p>\n<p>This post will cover all aspects of CARTA and how businesses can implement it to ensure robust cybersecurity. </p>\n<h2 id=\"what-is-carta-how-does-it-benefit-businesses\" style=\"position:relative;\"><a href=\"#what-is-carta-how-does-it-benefit-businesses\" aria-label=\"what is carta how does it benefit businesses permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>What is CARTA? How Does it Benefit Businesses?</h2>\n<p>Gartner, an information technology (IT) research and consultancy company, introduced CARTA back in 2017. CARTA is an approach built on <a href=\"https://www.loginradius.com/blog/engineering/what-is-adaptive-authentication/\">adaptive security architecture</a> that helps businesses manage risks associated with security. </p>\n<p>CARTA ensures businesses employ a consistent, up-to-date approach to cybersecurity in the ever-increasing digital landscape where we’re interconnected with millions of devices.</p>\n<p>Since digitalization offers endless opportunities and business advancements through efficiency and accessibility, the fact that specific vulnerabilities are associated with it can’t be overlooked. </p>\n<p>Here’s where enterprises need to adopt a robust approach to manage the risks successfully. CARTA allows businesses to make more informed decisions through the degree of trust and depth of a risk. </p>\n<h2 id=\"carta-approach\" style=\"position:relative;\"><a href=\"#carta-approach\" aria-label=\"carta approach permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>CARTA Approach</h2>\n<p>CARTA stipulates various aspects for cybersecurity and risk management, including: </p>\n<ul>\n<li>Continuous monitoring, assessment, and immediate response for remediation of an underlying risk</li>\n<li>100% device visibility</li>\n<li>Automated control</li>\n<li>Micro-segmentation for containing data breaches </li>\n<li>Adequate security management for IoT devices </li>\n<li>Risk and trust shouldn’t be static </li>\n</ul>\n<h2 id=\"stages-of-it-security-for-implementation-of-carta\" style=\"position:relative;\"><a href=\"#stages-of-it-security-for-implementation-of-carta\" aria-label=\"stages of it security for implementation of carta permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Stages of IT Security for Implementation of CARTA</h2>\n<p>According to Gartner, CARTA can be applied in three 3 diverse IT phases to monitor and assess continuously. These include Run, Plan, and Build. </p>\n<p>Let’s understand these phases where businesses can implement CARTA. </p>\n<ul>\n<li><strong>Run:</strong> Organizations utilize intelligent analytics to detect anomalies and to detect the baseline in the run phase. This helps organizations notice and respond to security incidents rapidly without hampering the overall security mechanisms. Automated solutions for the run phase can help enhance evaluations through valuable insights driving more success. </li>\n<li><strong>Build:</strong> Since organizations utilize public libraries for creating personalized, efficient, and updated cybersecurity solutions, CARTA dictates they analyze these libraries for security risks before implementing them carefully. </li>\n<li><strong>Planning:</strong> Before implementing IT security solutions, businesses must carefully focus on their priorities and assets. They must plan their budget and roadmap early to ensure better decisions in the long run. </li>\n</ul>\n<p><strong>Also Download</strong>: <a href=\"https://www.loginradius.com/resource/adaptive-authentication-in-the-age-of-digital-apocalypse/\">Adaptive Authentication in the Age of Digital Apocalypse</a></p>\n<p>In a nutshell, CARTA ensures organizations manage the risks associated with the digital world by emphasizing and developing security mechanisms that are continuously monitoring and assessing every aspect.  </p>\n<p>Through a simplistic view of the digital world, organizations can protect their assets by analyzing what is good and bad well in advance and taking the necessary steps to prevent any harm. </p>\n<h2 id=\"final-thoughts\" style=\"position:relative;\"><a href=\"#final-thoughts\" aria-label=\"final thoughts permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Final Thoughts</h2>\n<p>Every business in the digital landscape is prone to several security threats if stringent security measures aren’t in place. </p>\n<p>CARTA’s risk reduction model is <a href=\"https://www.loginradius.com/on-premises-deployment/\">built on the premise</a> that everything should be assessed and monitored and eventually proposes a revolutionary security and risk management mindset for the upcoming decade. </p>\n<p>Hence, businesses striving to implement the best security practices must consider relying on CARTA for enhanced risk management for their organization.</p>\n<p><a href=\"https://www.loginradius.com/contact-us?utm_source=blog&#x26;utm_medium=web&#x26;utm_campaign=3-stages-gartner-carta-it-security\"><img src=\"/8fce571f703a5970dbb1359a2fe0e51a/book-a-demo-loginradius.webp\" alt=\"book-a-free-demo-loginradius\"></a></p>\n<style class=\"grvsc-styles\">\n  .grvsc-container {\n    overflow: auto;\n    -webkit-overflow-scrolling: touch;\n    padding-top: 1rem;\n    padding-top: var(--grvsc-padding-top, var(--grvsc-padding-v, 1rem));\n    padding-bottom: 1rem;\n    padding-bottom: var(--grvsc-padding-bottom, var(--grvsc-padding-v, 1rem));\n    border-radius: 8px;\n    border-radius: var(--grvsc-border-radius, 8px);\n    font-feature-settings: normal;\n  }\n  \n  .grvsc-code {\n    display: inline-block;\n    min-width: 100%;\n  }\n  \n  .grvsc-line {\n    display: inline-block;\n    box-sizing: border-box;\n    width: 100%;\n    padding-left: 1.5rem;\n    padding-left: var(--grvsc-padding-left, var(--grvsc-padding-h, 1.5rem));\n    padding-right: 1.5rem;\n    padding-right: var(--grvsc-padding-right, var(--grvsc-padding-h, 1.5rem));\n  }\n  \n  .grvsc-line-highlighted {\n    background-color: var(--grvsc-line-highlighted-background-color, transparent);\n    box-shadow: inset var(--grvsc-line-highlighted-border-width, 4px) 0 0 0 var(--grvsc-line-highlighted-border-color, transparent);\n  }\n  \n</style>","headings":[{"value":"What is CARTA? How Does it Benefit Businesses?","depth":2},{"value":"CARTA Approach","depth":2},{"value":"Stages of IT Security for Implementation of CARTA","depth":2},{"value":"Final Thoughts","depth":2}],"fields":{"slug":"/identity/3-stages-gartner-carta-it-security/"},"frontmatter":{"metatitle":"3 Best Phases Where Businesses Can Implement CARTA","metadescription":"IT security is an integral part of business in the digital landscape. Let’s understand how CARTA can help improve overall business security.","description":"CARTA (Continuous Adaptive Risk and Trust Assessment) is a new and efficient IT security approach introduced by Gartner to help cybersecurity experts ensure a stringent mechanism to handle vulnerabilities.","title":"3 Best Stages of IT Security for Implementing Gartner's CARTA","canonical":null,"date":"November 10, 2021","updated_date":null,"tags":["security"],"coverImage":{"childImageSharp":{"fluid":{"aspectRatio":1.639344262295082,"src":"/static/d61f7309ee63ba983095bdd0735a4454/2ad7f/carta.webp","srcSet":"/static/d61f7309ee63ba983095bdd0735a4454/1c9b5/carta.webp 200w,\n/static/d61f7309ee63ba983095bdd0735a4454/f1752/carta.webp 400w,\n/static/d61f7309ee63ba983095bdd0735a4454/2ad7f/carta.webp 800w,\n/static/d61f7309ee63ba983095bdd0735a4454/c5377/carta.webp 1024w","sizes":"(max-width: 800px) 100vw, 800px"}}},"author":{"id":"Vishal Sharma","github":null,"bio":"Vishal Sharma - a writer by day and a reader by night, is working as a Sr. Content Writer at LoginRadius. With a demonstrated history of thriving business success through sustainable marketing tactics, he ensures high-quality & valuable content is distributed across diverse channels. When not writing, you can find him watching a movie or maybe, reading a book.","avatar":null}}}},"pageContext":{"id":"e4f92c29-0780-527c-a283-cb32029e5eaf","fields__slug":"/identity/3-stages-gartner-carta-it-security/","__params":{"fields__slug":"identity"}}},"staticQueryHashes":["1171199041","1384082988","1711371485","1753898100","2100481360","229320306","23180105","528864852"]}