Zero Trust—What is it and How to Implement?
Associated Best Practices and Vendors
14-May-2020
North America
Market Research
$1,500.00
Special Price $1,125.00 save 25 %
The Frost & Sullivan report presents the concept of Zero Trust Architecture and best practices for CISOs.
A Zero Trust Network (ZTN) is based on the basic principle of “never trust, always verify”. ZTN is a model or guiding design principle. It is an overall strategy and framework to prevent unauthorized access, contain breaches and reduce the risk of an attacker’s lateral movement through a network. Interest in Zero Trust Architecture has been gaining momentum in the last two years.
With the increasing level of malware, cyber attacks and attack innovation, organizations are under constant threat. Every device on a network is a potential attack or reconnaissance point. Devices include not only the “traditional” endpoints of PC and servers, but also IoT and the IT/OT convergence. The increasing number and diversity of endpoint devices opens up more attack vectors.
No one is trusted by default from inside or outside the network. ZTN is a general approach for leveraging various security technologies to enable perimeter enforcement and strict access controls. Verification is required from everyone and everything trying to gain access to resources on the network. ZTN is a comprehensive approach to securing all access across an organization’s networks, applications, and environment. It provides secure access from users, end-user devices, APIs, the Internet of Things (IoT), microservices, containers, and more.
Many vendors are announcing they have a ZTN solution, attempting to leverage their current product portfolio. Many CISOs do not fully understand Zero Trust. Security vendors are educating their customers. CISO’s are looking for best practices and solutions that can help them to achieve Zero Trust security in their environments. CISOs expect Zero Trust tools to secure their users with high performance and minimal interference. As CISO’s look to implement a ZTN there are several issues and best practices to keep in mind. The most overriding principle of ZTN is “never trust, always verify”. It is not only the perimeter that must be protected but also countering lateral threat attacks.
Many vendors are promoting their ZTN capabilities via integration of their product portfolios. Most vendors offer a ZTN platform or program focusing on their specific strength. NAC, NGFW, SDP and IAM/PAM are the foundations for different vendors.
The network perimeter is no longer clearly defined. Organizations are migrating quickly to the cloud. This trend has accelerated as the recent Covid-19 pandemic is driving unprecedented transition known as work from home (WFH).
The principles and philosophy for a Zero Trust Network described in this paper serves the needs of an increasingly mobile and remote workforce. During the turmoil of the Covid-19 pandemic, cyber criminals are trying to take advantage with increased attacks. Remote workers are a major vulnerability. ZTN is an important tool for CISOs to extend network protection.
Author: Tony Massimini
Analysis
Purchase includes:
- Report download
- Growth Dialog™ with our experts
Growth Dialog™
A tailored session with you where we identify the:- Strategic Imperatives
- Growth Opportunities
- Best Practices
- Companies to Action
Impacting your company's future growth potential.
Deliverable Type | Market Research |
---|---|
No Index | No |
Podcast | No |
Author | Tony Massimini |
Industries | Information Technology |
WIP Number | 9856-00-29-00-00 |
Is Prebook | No |
GPS Codes | 9659,9856-74,9887-C1 |