Under lock and key. The principles of zero-trust
Manage episode 346922352 series 3378240
Contenuto fornito da Mariela leibovich and Cato Networks. Tutti i contenuti dei podcast, inclusi episodi, grafica e descrizioni dei podcast, vengono caricati e forniti direttamente da Mariela leibovich and Cato Networks o dal partner della piattaforma podcast. Se ritieni che qualcuno stia utilizzando la tua opera protetta da copyright senza la tua autorizzazione, puoi seguire la procedura descritta qui https://it.player.fm/legal.
With legacy network solutions based on VPN, authenticated users used to gain access to everything on the same subnet. Only a password prevented unauthorized users from accessing a resource. Zero trust flipped that paradigm by allowing users to only “see” the specific applications and resources explicitly permitted by their company’s security policy. Where did zero trust come from and why should you care? Today’s guest is Bill Carter, Cato Networks’ sales engineer. We’ll talk about the principles of zero-trust, verification processes and how does a proper ZTNA architecture should look like.
…
continue reading
18 episodi