


In this video I’ll discuss the history of Zero Trust and what it really takes to deploy a solution that implements these ideals. This leaves a lot to sort through to get to how you actually architect your security.

Software-Defined Perimeter (SDP), Google’s BeyondCorp initiative, Gartner’s Continuous Adaptive Risk and Trust Assessment (CARTA), and even older DoD and industry initiatives all have something to say about trust and access. The landscape can also be confusing when you start to hear other terms in use that have a similar message. The idea that we should no longer trust our networks, our users, or their devices without first verifying identity and status makes sense in this new work environment. Zero Trust has been receiving a lot of buzz in recent months, driven by mobility and BYOD that have brought new threats along with their productivity benefits.
