Zero Trust: Case Studies and Lessons Learned

  • Friday, March 2, 2012 | 10:10 AM – 11:00 AM | Room: Room 310

View all Sessions

Old security models are like an M&M, a hard outside and soft center, trusting that attackers won't get past the perimeter. But today's advanced attacks easily pierce these shells. We must eliminate the soft center, and weave security throughout the network employing a "Zero Trust" model. In this session, we look at pioneering efforts to realize this model and design security from the inside out.


This document was retrieved from on Sun, 23 Oct 2016 12:09:58 -0400.
© 2016 EMC Corporation. All rights reserved.