IT Focus Area: security
February 7, 2018
Zero Trust Architecture: Never Trust, Always Verify
Traditional data security strategies tend to operate under a “trust but verify” approach — trusting internal users with unrestricted network access and considering the external network as the only network in need of security controls.
Rooted in the principle of “never trust, always verify,” Zero Trust architecture is an alternative and individualized approach to network security that uses an organization’s functionality and business objectives to determine exactly what data needs to be safeguarded and how best to do it.
Because it diverges from traditional strategies, there are common misconceptions about the implementation and function of this approach. We spoke with the creator of Zero Trust, John Kindervag, to debunk myths and learn how the model can be strategically implemented.
Listen to this episode to learn:
- Why Zero Trust architecture is changing security strategies
- The 4 major myths about Zero Trust architecture
- How real companies are finding success with this model
- How to implement the Zero Trust approach