What is Zero Trust (And How To Accelerate Your Strategy)

แชร์
ฝัง

ความคิดเห็น • 10

  • @chinedum.
    @chinedum. 2 ปีที่แล้ว +2

    Thank you, Steve.
    I enjoyed your SASE playlist. I'm new to cybersecurity and currently working on a project around IoT and AI. Came across Edge Computing and learnt all about SASE.
    You break it down so succinctly in layman's terms for clear understanding. Thank you again.

  • @mohdarainify
    @mohdarainify ปีที่แล้ว

    Hi steve, I have watched couple of videos from your playlist, they are well organized and simple, make things easy to understand.
    I am bit confuse thought regarding the zerotrust approach, which does not like word perimeter security.
    My question is what about perimeter security at branch offices? Traditionally firewall protect it from both inside and outside threats, does moving to zerotrust model means we no longer needs them at perimetre? How do we protect branch office perimetre in zerotrust model.
    Thanks

    • @steve_murphy1
      @steve_murphy1  ปีที่แล้ว

      Thanks for your comment. You are correct. ZTNA does not like the word perimeter. In theory, ZTNA will make traditional perimeter security measures unnecessary, but I think we are a long way away from that. Currently, I'd view ZTNA as an advanced form of access control. Best, Steve

  • @nrshari
    @nrshari 2 ปีที่แล้ว

    Nice succinct videos. Thankyou Steve

  • @batista98854
    @batista98854 2 ปีที่แล้ว

    Thank you Steve from India. Kindly make more videos and thanks a lot!!!

  • @BoazMichaely
    @BoazMichaely 3 ปีที่แล้ว

    Hi Steve,
    Thanks for your SASE series, it is all very well explained!
    A question on this ZT session: it seems like the proxy server is a highly privileged and trusted entity, isn't it?
    Thanks !

    • @steve_murphy1
      @steve_murphy1  3 ปีที่แล้ว +2

      Thanks for your question! Yes, the proxy is a highly trusted entity, but less so than current solutions. It's less trusted in that the proxy in a ZTNA framework only provides access to specific resources permitted for the particular user. This is very different than the broad access that's permitted by current VPN solutions. Hope that helps. Best, Steve