Lately you’ve heard us talking a lot about Zero Trust, an architectural approach to enterprise security that uses “never trust, always verify” as its guiding principle.
First proposed by Forrester Research, a Zero Trust approach means there is no default trust for any entity, regardless of what it is and its location on or relative to the corporate network. With Zero Trust boundaries, you’re compartmentalizing different segments of your network. You can protect critical intellectual property, reduce the exposure of vulnerable systems, and prevent the lateral movement of malware throughout your network in a way other segmentation solutions – including the use of VLANs – do not.
True Zero Trust segmentation requires an enterprise security platform that addresses applications, users and content – and that’s exactly what Palo Alto Networks provides through secure access, inspection of all traffic, and advanced threat protection.
We’re pleased to share a range of new resources to help you get started with critical Zero Trust concepts:
- Our Zero Trust resource page includes detailed discussions of the Zero Trust concept and links to videos, Forrester research and how we address segmentation forPCI compliance.
- Our Zero Trust whitepaper itemizes the essential criteria and capabilities required of a Zero Trust solution, and also how the Palo Alto Networks next-generation security platform delivers on these requirements.