29. Zero Trustלמעשה הלכה
• Zero Trust Networks
• the ability to “Divide and Rule” your
network
• enforce a “Least Privileged” access
policy
• Zero Trust People
• Single Sign-On, Multi-Factor
Authentication
• Zero Trust Devices
• End Point : Hardware / OS
• Non PC / OT / IOT
• Zero Trust Workloads
• AWS / CGP / AZURE
• Cisco ACI / CISCO ISE
• Zero Trust Data
• Data Encryption
• Data Loss Prevention
• Data Management Categorization and
Classification
• Visibility & Analytics
• Automation & Orchestration
• APIs
33. SDP - Software Defined Perimeter (Black Cloud)
The Zero Trust, Software-Defined Perimeter is becoming the de-facto standard for secure network
access. Industry analysts are touting this new approach based on its ability to increase your
security, while at the same time easing the operational burdens associated with traditional
network security and simplifying your environment.
• Gartner says that "SDP enables organizations to provide people-centric, manageable, secure
and agile access to networked systems. It is easier and less costly to deploy than firewalls, VPN
concentrators and other bolt-in technologies
• Forrester recommends implementing a broad range of Zero Trust threat prevention
technologies.
• The Cloud Security Alliance says that “The SDP security model has been shown to stop all
forms of network attacks including DDoS, Man-in-the-Middle, Server Query (OWASP10) as well as
Advanced Persistent Threat.”
As enterprise organizations come to the realization that traditional network security is failing them,
a Zero Trust, Software-Defined Perimeter solution is a network security alternative to secure
hybrid environments.