THE CIRCLE OF ZERO TRUST

Before we start to look at “The Circle of Zero Trust™ it’s important we first understand a little more about the concept of zero trust.

That’s right it is a concept, and a framework; not a product, service or platform that some may have you believe. Zero Trust (ZT) as a concept was first proposed by Forrester Research as a Blue Print for Security Architecture.

The main premise of ZT is the internet has become more ubiquitous and we are constantly connected; the perimeter demarcation points have moved; trust is no longer inherent. The old castle and moat approach where a heavily guarded entrance (perimeter security) to validate access and then grant trust is no longer sufficient for today’s users, applications and networks that are perimeter less, hyper-connected and cannot be trusted. The Zero Trust approach and principals are to “never trust, always verify”

The Five Main Points of Zero Trust *

* ZERO TRUST NETWORKS, BUILDING SECURE SYSTEMS IN UNTRUSTED NETWORKS | AUTHOR: EVAN GILMAN & DOUG BARTH | OREILLY.COM

The networks are always assumed to be hostile.

External and internal threats exist on the network at all times.

Networks locality is not sufficient for deciding trust in a network.

Every device, user and network flow is authenticated and authorised

Polices must be dynamic and calculated from as many sources of data as possible.

Now we have a basic understanding of Zero Trust we can introduce CyberCyte’s Circle of Zero Trust, which is an extended framework of solutions within our platform that helps organisations in their journey to achieving Zero Trust. Each solution is fully integrated and also available standalone.

The modules within the circle, are as follows:
  • Identity management and authentication services for users and applications.
  • Networks and device access control.
  • DNS Security and External application Validation.
  • Complete Visibility into Users, Device and Networks.

NetCyte is a next-generation NAC solution that provides dynamic and adaptive access control with unparalleled threat discovery.

DNSCyte is a recursive DNS Service based on global cyber threat intelligence and machine learning to block threats and targeted attacks in real time.

Would you like to learn more about how to protect your business?

We're member of 

We're member of

© 2019-2020 CyberCyte. All Rights Reserved.