Forrester Report Available: Zero Trust

0

Traditional security approaches that follow the “trust but verify” concept are insufficient against today’s persistent and evolving cyberthreats. A new approach, the Zero Trust model of information security, eliminates the assumption that there are “trusted” and “untrusted” networks. With the Zero Trust model, we flip “trust but verify” into “verify and never trust” and take a data-centric approach to security.

In Leverage Micro-Segmentation To Build A Zero Trust Network, a June 2015 commissioned study conducted by Forrester Consulting on behalf of VMware, the hypothesis is explored that the Zero Trust model, which can be enabled through network virtualization and micro-segmentation, helps businesses improve agility, security, and compliance within their networks.

Forrester surveyed companies across the United States, Europe, and Asia Pacific and found that 60 percent have adopted network virtualization to some extent. As these companies embraced Zero Trust concepts and adopted network virtualization and micro-segmentation, they saw benefits that reduced risk and supported a higher-level security strategy.

Check out the complete set of findings and understand how your business can start moving toward a Zero Trust model through micro-segmentation. Read the full study today.

 

Photo credit: Wavebreakmedia Ltd/iStock/Thinkstock

Share

About Author

Our editorial team gets fired up about the transformative power of technology. We want to bring you aha moments, fresh perspectives, eye-opening insights, and the occasional controversial concept. To do so, we tap into a global network of writers, evangelists, pundits, and business strategists. Our goal: Become your trusted go-to resource for current information about game-changing IT.

Comments are closed.