The old perimeter is being supplemented, as the firewall shouldn’t be the only policy enforcement point. Discuss the “zero trust” and Google “BeyondCorp” models with your peers: how to adopt this new way of looking at users, endpoints and applications; what resources are needed; and which risks it mitigates.
1: Understand what "zero trust" actually means (it’s not a product).
2: Learn how it can apply to different types of organizations.
3: Discuss the stages, effort, resourcing and resulting risk reduction.
Security Strategy & Architecture
SSO software defined networking security architecture practitioner perspectives access control
Share With Your Community