Supporting the Zero Trust Model of Information Security

Supporting the Zero Trust Model of Information Security

Cover

In today’s new threat landscape, notions of “trust but verify” are outdated and very vulnerable to a plethora of cyberattacks. Hackers have found a multitude of ways to infiltrate the security wall built by your business. Sometimes they even use malicious insiders in positions of trust in your network. According to a survey by Forrester Research, Inc. in 2013, inadvertent misuse by an insider is the most common cause of a security breach.

This white paper highlights a new approach to security that is needed today. It eliminates the idea of trusted network and an untrusted network to address both intern and external threats. Read on and learn about this security solution’s three main concepts:

  • All resources are securely accessed regardless of location.
  • Strict least-privilege access control is mandatory
  • And one more!
Vendor:
IBM
Posted:
20 Feb 2014
Published:
30 Sep 2013
Format:
PDF
Length:
7 Page(s)
Type:
White Paper
Language:
English
Already a Bitpipe member? Login here

Download this White Paper!

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy