With Zero Trust, you MUST secure all communication, no matter where they come from.

Dwaine Snow
Oct 19, 2021

The concept of a Zero Trust network access (ZTNA) contrasts with traditional access solutions. Traditionally, if a user was inside the “walls” of the organization (either because they physically connected from a device withing the organization, or used a corporate VPN — they would then have unfettered access within/across the entire network.

With Zero Trust this is no longer the case. With Zero Trust, the default access policy is to deny service UNLESS you send the correct signal (userID and device — as we discussed earlier). Explicit access must be verified and granted to each an every resource.

With the geographically dispersed workforce that has come about because of the COVID pandemic and changing workforce — this validation has become even more critical today than ever before.

--

--

Dwaine Snow

Helping understand how cyber resiliency and Zero Trust security solutions can keep their systems and data safe, and always available.