home_banner `

Content Icon

Zero in on Zero Trust

May 15, 2019 | Faculty Reports | Architecture, Configuration and Segmentation | By Dave Shackleford, IANS Faculty

What exactly is zero trust and how viable is it as a security strategy? In this report, IANS Faculty Dave Shackleford defines zero trust, explains why today’s cloud-based workloads require a dynamic zero trust security architecture and provides an overview of the current vendor marketplace.
IANS

 SUBSCRIPTION REQUIRED


Already a client?

Log In to Continue

Not a client?

Request More Information

Related Research

Medical Device Security: A Status Check

Medical devices present unique security risks. In this report, IANS Faculty Justine Bone explains the risks, where the threat is headed and what hospitals and manufacturers should be doing now to secure these devices.

Use Geo-Blocking to Reduce Malicious Traffic

Some countries are notorious for disseminating malicious traffic. In this Ask-an-Expert written response, IANS Faculty Dave Shackleford says geo-blocking can help limit exposure, and he recommends some tools to ease the process.

Perimeter Security Checklist

Perimeter security is critically important. This high-level checklist provides best practice steps to keep your perimeter and organization secure.

Firewall Rule Compliance Tools: Know the Pros and Cons

What are the pros and cons of firewall rule compliance tools like FireMon? In this Ask-an-Expert written response, IANS Faculty Jake Williams says the tools are great for ensuring firewall rules match policy, but he cautions that creating an audit model and chasing down stale rules can eat up staff resources.