Overview

Zero-Trust security. Swtich from a perimeter-based (firewall and VPN) model of access to a user to resource model.

Implement strong, simple identity. Identity for both a person, but also a system. Decouple the identity from the corporation: make it affinitive to the user, a single identity.

Enforce entitlements and authorisation in the network.

This micro-segmentation is simpler to use, more accessible, and, more secure. It reduces the lateral-traversal, it empowers the users, it increases the audit capability. And, its more economical, more scalable. Everybody wins.


Articles