1、W H I T E PA P E RA Blueprint for Building a Zero Trust A|2Introduction 3Hybrid work,cloud apps shatter the network security paradigm 4A Zero Trust security architecture 5How does an organization create a Zero Trust architecture?6The dark side of Zero Trust 7Elements of Zero Trust 8Zero Trust Networ
2、k Access 10Key considerations for purchasing Zero Trust Network Access solutions 11Look to the edge 12Multi-factor authentication considerations in building a Zero Trust blueprint 13Microsegmentation 14Differentiators in microsegmentation 15DNS firewall 17Core Zero Trust requirements of DNS firewall
3、 investment 18Threat monitoring 19Where to begin?20The case for starting with microsegmentation 21Platform vs.specialized tools 22Conclusion 23Table of |3IntroductionThe concept of Zero Trust has been around since 2009,when Forrester Research first promoted it,warning organizations that it was time
4、to overhaul the traditional method of granting unfettered access to any user or application that passed the network perimeter.Instead,every device,user,and network flow should be verified before full access is granted.In the ensuing years,thanks to many factors,the urgency to adopt the concept of Ze
5、ro Trust has only grown.Todays hybrid workforce operates from various locations,with BYOD programs enabling employees to access corporate applications and resources using both managed and unmanaged devices.Applications are hosted everywhere cloud,on-premises,and hybrid.The net result of these change
6、s is that the network perimeter as it was no longer exists.Ransomware attacks have grown in frequency and sophistication,increasing the chances of an attacker breaching your defenses and increasing the costs once they do.The average cost of a data breach in the United States is the highest in the wo