NIST Zero Trust Explained
from a Data Perspective
What is Zero Trust?
▪ Eliminates implicit trust
▪ Move from perimeter network
defense to focusing on and
protecting individual or small
groups of resources.
▪ Important for protecting data
resources in distributed
(perimeter less) environments.
(Cloud, Work from Home, BYOD)
▪ Evaluate trust based on each
transaction.
▪ Dynamic security model
Moving from static to dynamic security
Do you let your kid
go to the party?
https://www.racktopsystems.com/videos/nist-zero-trust-explained/
Zero trust in day-to-day life
Questions
• Where is the party?
• Who is going with you?
• When will you be home?
• Do the parents know?
• Will the parents be there?
Situational Factors
• Has my kid been well behaved recently
• Has he been in trouble with this group before
• Does he seem like he is being honest
Files Are a Critical
Enterprise Resource
Zero Trust Architecture for IT
▪ Enable zero trust principles around file
access
▪ Zero trust moves from a static security
and permissions model to a dynamic
security model
▪ Evaluate each request to read, modify
or write a file
File access denied or granted?
NIST Zero Trust Architecture
Implement Zero Trust
Focus on the data
▪ Legacy storage and file shares are the weakest link
when it comes to data security.
▪ BrickStor SP solves that problem by baking in security
without sacrificing performance, resulting in
a data centric Zero Trust architecture.
▪ Monitor and evaluate every data operation in real
time.
▪ Automatically stop suspicious and malicious activity.
Some security products just protect the
network, but the bad guys steal data,
not the network.
We believe every organization has the
right to protect their data as if it were a
national secret.
BrickStor SP Active Defense in Action
Watch BrickStor SP stop a Ryuk Ransomware Attack
https://www.racktopsystems.com/videos/stop-ryuk-ransomware-with-active-defense/
Learn More
https://www.racktopsystems.com/brickstor-sp/

NIST Zero Trust Explained

  • 1.
    NIST Zero TrustExplained from a Data Perspective
  • 2.
    What is ZeroTrust? ▪ Eliminates implicit trust ▪ Move from perimeter network defense to focusing on and protecting individual or small groups of resources. ▪ Important for protecting data resources in distributed (perimeter less) environments. (Cloud, Work from Home, BYOD) ▪ Evaluate trust based on each transaction. ▪ Dynamic security model Moving from static to dynamic security
  • 3.
    Do you letyour kid go to the party? https://www.racktopsystems.com/videos/nist-zero-trust-explained/ Zero trust in day-to-day life Questions • Where is the party? • Who is going with you? • When will you be home? • Do the parents know? • Will the parents be there? Situational Factors • Has my kid been well behaved recently • Has he been in trouble with this group before • Does he seem like he is being honest
  • 4.
    Files Are aCritical Enterprise Resource Zero Trust Architecture for IT ▪ Enable zero trust principles around file access ▪ Zero trust moves from a static security and permissions model to a dynamic security model ▪ Evaluate each request to read, modify or write a file
  • 5.
    File access deniedor granted? NIST Zero Trust Architecture
  • 6.
    Implement Zero Trust Focuson the data ▪ Legacy storage and file shares are the weakest link when it comes to data security. ▪ BrickStor SP solves that problem by baking in security without sacrificing performance, resulting in a data centric Zero Trust architecture. ▪ Monitor and evaluate every data operation in real time. ▪ Automatically stop suspicious and malicious activity. Some security products just protect the network, but the bad guys steal data, not the network. We believe every organization has the right to protect their data as if it were a national secret.
  • 7.
    BrickStor SP ActiveDefense in Action Watch BrickStor SP stop a Ryuk Ransomware Attack https://www.racktopsystems.com/videos/stop-ryuk-ransomware-with-active-defense/
  • 8.