Lately you’ve heard us talking a lot about Zero Trust, an architectural approach to enterprise security that uses “never trust, always verify” as its guiding principle.
First proposed by Forrester Research, a Zero Trust approach means there is no default trust for any entity, regardless of what it is and its location on or relative to the corporate network. With Zero Trust boundaries, you’re compartmentalizing different segments of your network. You can protect critical intellectual property, reduce the exposure of vulnerable systems, and prevent the lateral movement of malware throughout your network in a way other segmentation solutions – including the use of VLANs – do not.
True Zero Trust segmentation requires an enterprise security platform that addresses applications, users and content – and that’s exactly what Palo Alto Networks provides through secure access, inspection of all traffic, and advanced threat protection.
We’re pleased to share a range of new resources to help you get started with critical Zero Trust concepts:
And if you’ll be joining us at Ignite 2014 in Las Vegas next week, we will have several sessions devoted to Zero Trust as part of our Modern Data Centers track. Register now for Ignite if you haven’t already, and we’ll see you there!
In the meantime, check out a recent video with John Kindervag and I discussing Zero Trust and what it means for customers:
By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder.