There is almost zero chance that you haven’t heard the term “Zero Trust” recently. The term, coined in 2010 by John Kindervag, one of the world’s foremost cybersecurity experts, recognizes that trust applies only to people, not digital environments. It also implies a hard-line stance on cyber security which has become critical in today’s increasingly mobile and hybrid world. According to the National Institute of Standards and Technology (NIST), Zero Trust is a security model based on an acknowledgement that threats exist both inside and outside traditional network boundaries. A Zero Trust security strategy eliminates implicit trust in any one element, component, node, or service and instead requires continuous verification of the operational picture via real-time information from multiple sources to determine access and other system responses. When adopting this new mindset, it’s vital to understand that Zero Trust is constantly evolving and not something to set and forget. As such, the core principles of Zero Trust can be applied to all parts of your security strategy at any time. Decentralized, multifactor encryption is essential to removing implicit trust in data protection. Any Zero Trust security model is incomplete without it.
To learn more please download this whitepaper.