9: Zero Trust networks, the concepts, the strategies, and the reality

David Allan Eric Haddon    Imperial College, London, United Kingdom

Abstract

For decades, firewalls have protected networks from attack by restricting and inspecting traffic at the network perimeter. With cloud computing and increase demands for remote access to corporate networks, the network boundaries have widened. Not only is email hosted in the cloud, but also are virtual desktops. Apps that previously required a few exceptions on a firewall now need to validate licence subscriptions and allow updates. The user must be able to transfer data as needed to online portals and reporting services that require an ever-increasing number of custom ports configured on firewalls. ...

Get Strategy, Leadership, and AI in the Cyber Ecosystem now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.