Security Primer: Why Zero Trust Trumps Traditional Security 

In November or December 2016, a system administrator at one of the world’s largest professional services firms clicked on an email that looked legitimate. A short time later, what looked like an important console started asking for administrator credentials—which were dutifully supplied. That was the initial vector of an attack that compromised the global email traffic of the company and dented its reputation when the attack surfaced publicly many months later.

The changing nature of cyber-attacks has caused enterprises to come to the realization that attackers exploit the trust enterprises have built into their networks. To guard effectively against today’s threats, the nature of security defenses has to adapt to and modern security has to start with a major change in mindset that relates to trust.

In this whitepaper we discuss important aspects of zero trust security, including:

  • The evolution of network security: We review different network security models throughout the years and discuss why zero trust is the logical endpoint
  • Zero Trust Foundations: We explain the basics of a zero trust security policy and discuss its five foundational principles
  • Options for implementing zero trust: We go over the fundamental features of a zero-trust implementation and the planning and engineering included

Get the full story in our whitepaper.


Download Paper