Insights

Zero Trust

The Zero Trust paradigm focuses on eliminating implicit trust from IT architectures and enforcing strict identity verification and access controls for every user or device.

Zero Trust helps to redesign your cybersecurity architecture to function consistently and holistically across multiple IT environments and systems – and thus implementing Zero Trust properly will affect multiple existing and new security controls within your organization.

Guide
Guide
The Comprehensive Guide to Zero Trust Implementation
Read the full guide to learn how you can use Zero Trust to protect modern hybrid IT environments. Zero Trust applies to every aspect of an organization's processes.
Learn more
Blog
Blog
IGA, the key to security and compliance
Securing data and complying with the growing number of associated local, regional, and international regulations are two of the biggest challenges facing most modern organizations as they become...
Learn more
Leadership Compass
Leadership Compass
Zero Trust Network Access
This report is an overview of the market for Zero Trust Network Access (ZTNA) solutions and provides you with a compass to help you to find the solution that best meets your needs. We examine the...
Learn more
Webinar Recording
Webinar Recording
What Does the Future Hold for Passwordless Authentication and Zero Trust?
Enterprises of all types face a growing number of cyber threats today. Studies show that most data breaches begin with compromised passwords. Moreover, password management is expensive and not...
Learn more
The Next Level of Zero Trust: Software Security and Cyber Supply Chain Risk Management
Blog
The Next Level of Zero Trust: Software Security and Cyber Supply Chain Risk Management
The recent SolarWinds incident has shed a light on an area of cybersecurity that is not frequently in focus. Better said, it is “again has shed a light”, if we remember the Heartbleed...
Zero Trust: We’re Nowhere Near the End of the Story Yet
Blog
Zero Trust: We’re Nowhere Near the End of the Story Yet
Oh, how time flies! It seems that the whole story of Zero Trust as a revolutionary concept for designing computer networks began just yesterday, but it’s been over a decade already. In fact,...
The Non-Zero Elements of Zero Trust
Blog
The Non-Zero Elements of Zero Trust
The ongoing SolarWinds incident illustrates that the much-lauded Zero Trust security paradigm is, in fact, based on trust. Zero Trust is about authenticating and authorizing every action within a...
Ivanti’s Zero Trust Journey
Blog
Ivanti’s Zero Trust Journey
Ivanti has completed its acquisition of MobileIron and Pulse Secure. Ivanti, headquartered in Salt Lake City, had its roots in desktop management (LANDESK), evolved into endpoint and patch...
Data-Driven Decision Making for Identity Security
Blog
Data-Driven Decision Making for Identity Security
Symantec Enterprise: With more informed decisions comes more automated security. In today’s Zero Trust world, where the principle of least privilege is ubiquitous, enterprises are...
A Look at NIST’s Zero Trust Architecture
Blog
A Look at NIST’s Zero Trust Architecture
NIST, the US National Institute for Standards and Technology, recently released SP 800-207 Zero Trust Architecture . The NIST special publication examines the principles of and motivations for...
Zero Trust Paradigm for the Future of Security
Blog
Zero Trust Paradigm for the Future of Security
Martin Kuppinger explains the meaning behind the popular buzzword.
Building Trust by Design
Blog
Building Trust by Design
Trust has somehow become a marketing buzzword recently. There is a lot of talks about “redefining trust”, “trust technologies” or even “trustless models” (the...
Making Sense of the Top Cybersecurity Trends
Blog
Making Sense of the Top Cybersecurity Trends
With each passing year, the CISO’s job is not becoming any easier. As companies continue embracing the Digital Transformation, the growing complexity and openness of their IT infrastructures...
Beyond Datacenter Micro-Segmentation – start thinking about Business Process Micro-Segmentation!
Blog
Beyond Datacenter Micro-Segmentation – start thinking about Business Process Micro-Segmentation!
Sometime last autumn I started researching the field of Micro-Segmentation, particularly as a consequence of attending a Unisys analyst event and, subsequently, VMworld Europe. Unisys talked a lot...