DiscoverConvergenceUnder lock and key. The principles of zero-trust
Under lock and key. The principles of zero-trust

Under lock and key. The principles of zero-trust

Update: 2022-11-13
Share

Description

With legacy network solutions based on VPN, authenticated users used to gain access to everything on the same subnet. Only a password prevented unauthorized users from accessing a resource. Zero trust flipped that paradigm by allowing users to only “see” the specific applications and resources explicitly permitted by their company’s security policy. Where did zero trust come from and why should you care?

Today’s guest is Bill Carter, Cato Networks’ sales engineer. We’ll talk about the principles of zero-trust, verification processes and how does a proper ZTNA architecture should look like.
Comments 
00:00
00:00
x

0.5x

0.8x

1.0x

1.25x

1.5x

2.0x

3.0x

Sleep Timer

Off

End of Episode

5 Minutes

10 Minutes

15 Minutes

30 Minutes

45 Minutes

60 Minutes

120 Minutes

Under lock and key. The principles of zero-trust

Under lock and key. The principles of zero-trust

Cato Networks