Wednesday, November 4, 2020

In Zero we trust

This blog was written by an independent guest blogger.
The network is rapidly changing – What was once known as the ‘perimeter’ that comprised of a crunchy solid exterior with a soft chewy center consisting of endpoints has eroded into a mush of mobile devices, BYOD, IOT and hybrid cloud. Corporate applications and data are moving from on-premise to hybrid and cloud environments increasing cloud workloads by the day and enterprises want to give their staff the ability to access data anytime, anywhere – The location of applications, users, and their devices (which are sometimes unmanaged) are no longer static.
Traditional perimeter security methods have done little to stem the flow of today’s cyber-attack reality and this is where Zero Trust Architecture (ZTA) comes to the rescue!
‘Zero Trust’ was first introduced by Forrester Research and considers ‘inherent trust’ as a critical…

Haroon Malik Posted by:

Haroon Malik

Read full post

      

The post In Zero we trust appeared first on Cybersecurity Insiders.


November 04, 2020 at 09:09PM

0 comments:

Post a Comment