This resource is no longer available

Cover Image

The increasing frequency and sophistication of cybersecurity attacks on federal agencies has led to an unfortunate truth: Organizations can no longer wholly trust users, devices or applications on their networks.

This lack of implicit trust is the concept behind the increasingly popular zero-trust movement, built on a few guiding principles which include:

  • Security threats always exist within the network
  • All users, devices and applications need to be authenticated
  • Location is not an adequate basis for trust

This guide goes in further detail into the zero-trust model and offers recommendations for zero-trust adoption within federal agencies. Read on to get started.

Vendor:
Gigamon
Posted:
Feb 8, 2021
Published:
Feb 20, 2020
Format:
PDF
Type:
White Paper

This resource is no longer available.