Just for knowledge, the OSSTMM created this idea in the year 2000. Read the OSSTMM, ZTA idea is covered in Chapter 5 called Trust. Someone just stole the idea.
I thought this was an excellent, concise video on the subject, which really helped fill in the gaps of my understanding. I'm going to sift through your library to see what else you've got. Many thanks!
Most security products and strategies are not new or advanced. This includes the ‘Zero Trust’ strategy, regardless of how frequently vendors mention it. Authentication being used behind the firewall and on the internal devices of a network has been used for decades.
Honestly so many security things now days and 99.999% of business breaches are probably from email credential phishing or some guy doing something stupid like opening up an API database connection with no password 😂. Not that it all doesn’t help.
By far the best video on Zero Trust
Thank you for the kind words!
Completely agree. Always quality content from this channel.
Yeah he definitely earned a sub. I watched a few before this and this one explained it best.
Just for knowledge, the OSSTMM created this idea in the year 2000. Read the OSSTMM, ZTA idea is covered in Chapter 5 called Trust. Someone just stole the idea.
Agreed. Nicely presented!
Yoda was here. Yoda says: "Best video I've seen, on Zero Trust this is. Strong with the Force, this CISO is."
the best video of concept i've ever seen. Nice work. Not simple but also not too complex. Really on point 👍🏼
after discovering this channel, i always look it up if you have new content. love you vids man. keep up with this
Thanks Jimson. Appreciate the kind words
this is the best video on ZTA I have ever seen. Thank you
Great video, and informative. I appreciate the illustrations to help grasp concepts and use cases!
Great high-level intro to ZTNA. Thank you.
Glad you like it!
Best introduction video on Zero Trust I have seen.
Perfectly explained. Thank You. 5 stars.
You have the best videos. Would surely buy a course made by you.
Thank you for the support Laurenz. Much appreciated
I thought this was an excellent, concise video on the subject, which really helped fill in the gaps of my understanding. I'm going to sift through your library to see what else you've got. Many thanks!
Excellent... Thanks for putting together this wonderful video, and for sharing!
Clear explanation and best video on Zero Trust
Thanks for this explanation. Clear and concise.
Great Video. Short & Crisp. Keep Going Andy
Thank you!
Great content . Subscribed. Please continue
Awesome explanation of Zero Trust concepts!
every developer should watch this...
Excellent explanation! Thank you Andy.
Great video my dude
wow! very informative. thank you so much.
Great video. Right to the point thanks alot
Good explanation about ZTNA
thanks for this excellent video 👍🏻😀
Straight to the point 💯
Perfect video about the subject ..
great explanation ... thanks much
Well explained, thank you
Excellent explaination
Great video. Thanks.
Fantastic explanation brother
the OSSTMM created this idea in the year 2000. Read the OSSTMM, ZTA idea is covered in Chapter 5 called Trust
Great video! Can you please let me know what tool you used to create the whiteboard animations? Thank you!
The OSSTMM came up with this first using the methodology. Go read the OSSTMM, in this case Chapter 5 called "trust"
thank you for the vedio
but isn't ZTNA and SDP have the same concept?
Most security products and strategies are not new or advanced. This includes the ‘Zero Trust’ strategy, regardless of how frequently vendors mention it. Authentication being used behind the firewall and on the internal devices of a network has been used for decades.
greate video !!
by the way you have a typo error in cloudflare
Thanks Andy
Another example of no one in “zero trust “ can even agree on how many pillars there are. 3 here. 5-7 with the gov
Hello, very interesting
What tool do you use to create this type of animated content?
Using apsara pencil and sharpner
brilliant!
Don't forget about Versa!
Thanks alot
Most welcome
Good video. But you may need to correct the spelling mistakes : Principles, not Principals; Cloudflare, not Cloudfare.
Again where is this data stored for authentication purposes? Who controls it? Under what governmental law is it controlled?
Honestly so many security things now days and 99.999% of business breaches are probably from email credential phishing or some guy doing something stupid like opening up an API database connection with no password 😂. Not that it all doesn’t help.
Joana Summit
i love you
More boundaries , no thank you for this zero trust.