Supporting the Zero Trust Model of Information Security: The Important Role of Today's Intrusion Prevention Systems

Supporting the Zero Trust Model of Information Security: The Important Role of Today's Intrusion Prevention Systems

Cover

Security built around a network’s perimeter is no longer an effective approach: With cybercriminals leveraging malicious insider powers to infiltrate your systems, how do you know you can really trust those within your organization’s walls?

In this Forrester Research, Inc. report, explore a zero trust model based on 3 main concepts:

  1. All resources are securely accessed regardless of location
  2. Strict least-privilege access control is mandatory
  3. All network traffic is inspected and logged

Read on to learn how the intrusion prevention system (IPS) supports this concept thanks to its visibility and alerting capabilities, offering organizations clear insight into traffic and data so they can better protect against and prevent data breaches.

Vendor:
IBM
Posted:
20 Feb 2014
Published:
30 Sep 2013
Format:
PDF
Length:
7 Page(s)
Type:
White Paper
Language:
English
Already a Bitpipe member? Login here

Download this White Paper!

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy