Insights

Zero Trust

The Zero Trust paradigm focuses on eliminating implicit trust from IT architectures and enforcing strict identity verification and access controls for every user or device.

Zero Trust helps to redesign your cybersecurity architecture to function consistently and holistically across multiple IT environments and systems – and thus implementing Zero Trust properly will affect multiple existing and new security controls within your organization.

Guide
Guide
The Comprehensive Guide to Zero Trust Implementation
Read the full guide to learn how you can use Zero Trust to protect modern hybrid IT environments. Zero Trust applies to every aspect of an organization's processes.
Learn more
Webinar
Webinar
Mastering Global IAM for Cybersecurity Excellence: From Zero Trust Principles to Identity Threat Detection & Response (ITDR)
In today's interconnected global landscape, the role of Identity and Access Management (IAM) has never been more crucial in shaping cybersecurity strategies. As businesses expand across borders,...
Learn more
Blog
Blog
Securing the Digital Universe: Where Do We Even Start?
What a huge topic. The Digital Universe. Is this more than the Metaverse or less? Anyway: We live in the Digital Age. The vast majority of organizations rely on digital services to run at least...
Learn more
Whitepaper
Whitepaper
The Role of Identity for Zero Trust
Identity is central to Zero Trust. Zero Trust as the established leading principle for cybersecurity is about continuous verification instead of trust into a one-time proof by a singular system....
Learn more
Event Recording
Event Recording
Workshop | Implementation of a Risk Class Model Within Access Management
In this workshop, we will show you how to implement a risk class-based approach within access management with little effort in order to achieve the highest level of control, compliance and...
Learn more
Zero Trust: We’re Nowhere Near the End of the Story Yet
Blog
Zero Trust: We’re Nowhere Near the End of the Story Yet
Oh, how time flies! It seems that the whole story of Zero Trust as a revolutionary concept for designing computer networks began just yesterday, but it’s been over a decade already. In fact,...
The Non-Zero Elements of Zero Trust
Blog
The Non-Zero Elements of Zero Trust
The ongoing SolarWinds incident illustrates that the much-lauded Zero Trust security paradigm is, in fact, based on trust. Zero Trust is about authenticating and authorizing every action within a...
Ivanti’s Zero Trust Journey
Blog
Ivanti’s Zero Trust Journey
Ivanti has completed its acquisition of MobileIron and Pulse Secure. Ivanti, headquartered in Salt Lake City, had its roots in desktop management (LANDESK), evolved into endpoint and patch...
Data-Driven Decision Making for Identity Security
Blog
Data-Driven Decision Making for Identity Security
Symantec Enterprise: With more informed decisions comes more automated security. In today’s Zero Trust world, where the principle of least privilege is ubiquitous, enterprises are...
A Look at NIST’s Zero Trust Architecture
Blog
A Look at NIST’s Zero Trust Architecture
NIST, the US National Institute for Standards and Technology, recently released SP 800-207 Zero Trust Architecture . The NIST special publication examines the principles of and motivations for...
KuppingerCole Analyst Chat: Zero Trust as a Concept for … Trust and Security
Blog
KuppingerCole Analyst Chat: Zero Trust as a Concept for … Trust and Security
Matthias Reinwarth and Martin Kuppinger dispel a few myths about Zero Trust.
Zero Trust Paradigm for the Future of Security
Blog
Zero Trust Paradigm for the Future of Security
Martin Kuppinger explains the meaning behind the popular buzzword.
Building Trust by Design
Blog
Building Trust by Design
Trust has somehow become a marketing buzzword recently. There is a lot of talks about “redefining trust”, “trust technologies” or even “trustless models” (the...
Making Sense of the Top Cybersecurity Trends
Blog
Making Sense of the Top Cybersecurity Trends
With each passing year, the CISO’s job is not becoming any easier. As companies continue embracing the Digital Transformation, the growing complexity and openness of their IT infrastructures...
Beyond Datacenter Micro-Segmentation – start thinking about Business Process Micro-Segmentation!
Blog
Beyond Datacenter Micro-Segmentation – start thinking about Business Process Micro-Segmentation!
Sometime last autumn I started researching the field of Micro-Segmentation, particularly as a consequence of attending a Unisys analyst event and, subsequently, VMworld Europe. Unisys talked a lot...