scholarly journals The Why and How of adopting Zero Trust Model in Organizations

Author(s):  
Anita Nair

<div>As organizations move most of their workloads to public cloud and remote work becomes more</div><div>prevalent today, enterprise networks become more exposed to threats both from inside and outside</div><div>the organization. The traditional Perimeter Security Model assumes that threats are always from the</div><div>outside. It assumes that firewalls, proxies, IDS, IPS and other state-of-the-art infrastructure and</div><div>software solutions curb most of the cyberattacks. However, there are loopholes in this assumption,</div><div>which the Zero Trust Model addresses. This paper discusses the Zero Trust Model and it’s mandates</div><div>and evaluates the model based on the various implementations by the leading industry players like</div><div>Google and Microsoft.</div>

2021 ◽  
Author(s):  
Anita Nair

<div>As organizations move most of their workloads to public cloud and remote work becomes more</div><div>prevalent today, enterprise networks become more exposed to threats both from inside and outside</div><div>the organization. The traditional Perimeter Security Model assumes that threats are always from the</div><div>outside. It assumes that firewalls, proxies, IDS, IPS and other state-of-the-art infrastructure and</div><div>software solutions curb most of the cyberattacks. However, there are loopholes in this assumption,</div><div>which the Zero Trust Model addresses. This paper discusses the Zero Trust Model and it’s mandates</div><div>and evaluates the model based on the various implementations by the leading industry players like</div><div>Google and Microsoft.</div>


2009 ◽  
Vol 28 (10) ◽  
pp. 2455-2458
Author(s):  
Yi-yu YU ◽  
Jun-hua TANG ◽  
Yue WU
Keyword(s):  

2021 ◽  
Vol 1769 (1) ◽  
pp. 012006
Author(s):  
Ai-Ling Wang ◽  
Lei-ming Li ◽  
Guo-ling Xu

Sign in / Sign up

Export Citation Format

Share Document