THE CIRCLE OF ZERO TRUST
Before we start to look at “The Circle of Zero Trust™ it’s important we first understand a little more about the concept of zero trust.
That’s right it is a concept, and a framework; not a product, service or platform that some may have you believe. Zero Trust (ZT) as a concept was first proposed by Forrester Research as a Blue Print for Security Architecture.
The main premise of ZT is the internet has become more ubiquitous and we are constantly connected; the perimeter demarcation points have moved; trust is no longer inherent. The old castle and moat approach where a heavily guarded entrance (perimeter security) to validate access and then grant trust is no longer sufficient for today’s users, applications and networks that are perimeter less, hyper-connected and cannot be trusted. The Zero Trust approach and principals are to “never trust, always verify”
The Five Main Points of Zero Trust *
The networks are always assumed to be hostile.
External and internal threats exist on the network at all times.
Networks locality is not sufficient for deciding trust in a network.
Every device, user and network flow is authenticated and authorised
Polices must be dynamic and calculated from as many sources of data as possible.
The modules within the circle, are as follows:
NetCyte is a next-generation NAC solution that provides dynamic and adaptive access control with unparalleled threat discovery.
DNSCyte is a recursive DNS Service based on global cyber threat intelligence and machine learning to block threats and targeted attacks in real time.
We're member of
We're member of