Zero Trust Network Access. The principle of managing security between a user and a resource, rather than a user and a perimeter. By Identifying the user, providing Authorisation in the network, and then remote access to individual resources, we increase security and simplify at the same time. But, did you know you can do this with 0 inbound connections open? Nothing. No ports open to see on a pentest, on nmap, on Shodan. How? In this video I explain. In a nutshell, the resource makes a permanent outbound connection to the cloud. The user makes an outbound connection to the same cloud. Identity is confirmed, Authorisation is confirmed. The connections are stitched together. Simple and secure, no reconfiguration of firewalls. No client VPN software.
Recent Articles
-
Cleaning Up the Mess: How One Disgruntled Contractor Trashed a Network (And How to Stop It)
-
Agilicus Ready for the Quantum Leap: Securing Today’s Gear from Tomorrow’s Threats
-
Ditch the Digital Ostrich: How Zero Trust is Saving Municipalities (and Their Wallets) from Cyber Chaos
-
Stop Saying “It’s the Customer’s Choice” – It’s Costing You Money
-
Your Air Gap is a Lie, and Other Inconvenient Truths About Industry 4.0
-
You Have a Login, But You Shall Not Pass: The Magic of Fine-Grained Authorisation
