To receive an excerpt of this report, please fill out the following:

 

 

 

Zero Trust Networking

Authors

Sorell Slaymaker – Principal Consulting Analyst

Abstract

The combination of a largely disappearing perimeter, increased enterprise security threats and escalating damages resulting from breaches has introduced stronger levels of inspection and overall security. This includes a new security model called a zero-trust network architecture in which NOTHING on the network is trusted. Zero Trust Networking focuses on locking down all aspects of the network, inside and outside of traditional firewalls.

The goal of a Zero Trust Network (ZTN) is to stop malicious traffic at the edge of the network, before it is allowed to discover, identify, and target other networked devices. Getting to ZTN is just a continuation of the migration from zone-based network security models, to micro-segmentation, down to ZTN which is every user, device, service, and application.

This report describes what a Zero Trust Network is, the compelling case for moving to a ZTN, roadblocks faced, migration planning, and, to better understand the vulnerabilities, we provide mechanisms for measuring network attack surfaces.  We also provide a detailed set of best practice recommendations and a summary of vendors participating in this space.

We can help

If you want to find out more detail, we're happy to help. Just give us your business email so that we can start a conversation.

Thanks, we'll be in touch!

Stay in the know!

Keep informed of new speakers, topics, and activities as they are added. By registering now you are not making a firm commitment to attend.

Congrats! We'll be sending you updates on the progress of the conference.