What is Zero Trust

According to Gartner:

“No person/device/application in the enterprise network should be trusted by default, no matter if it’s in the internal or external network. The fundamental basis of the trust should be based on the refactored access control using the right authentication and authorization.”

Zero trust isn’t associated with any particular vendor’s approach to security. Think of it more as a broad philosophical idea on which a company can begin to change its security stance.

The idea is not to trust anyone, even if you know them because attacks can come from anywhere. While everyone needs to have a username and password, we know those kinds of credentials are much too easy to steal. 

Consider Multi Factor Authorization (MFA) or Single Sign On before you allow a person or device access to your network.

What’s more, you need to look at other data, such as where the person or device is signing in from, the device they are using and what they are trying to do. Is it all consistent with the way the person usually works?

Zero trust is can be a useful response to the modern way of interacting in computing environments and it’s worth exploring further to see if it’s the right approach for your clients.

Incorporate the Zero Trust approach into your security portfolio whether they are in the cloud or on-premises, – giving the employee secure access to corporate information