Skip navigation
Available Now: Zero Trust: Going Beyond the Perimeter patterns
Industry News

Available Now: Zero Trust: Going Beyond the Perimeter

The secure perimeter is evolving. It’s an evolution fueled by mobility, BYOD (bring your own device), cloud, collaboration and the consumerization of IT. 

Now, instead of thinking of the perimeter as one type of access control around the “edge” of the network, we need to start thinking of the perimeter as any place where you make an access control decision. Where an application tries to access a database, that’s a perimeter. When a user elevates privilege to perform a sensitive operation, that’s also a perimeter. 

A zero-trust approach shifts the secure perimeter to any place where you make an access control decision and prompts you to question your assumptions of trust every time there’s an access event.

The Three W’s of Zero Trust

In our new guide, Zero Trust: Going Beyond the Perimeter, we examine the genesis of the zero-trust approach and introduce the three pillars of zero-trust security:

  • Zero Trust for the Workforce: People such as employees, contractors, partners and vendors accessing work applications using their personal or corporate-managed devices. This pillar ensures only the right users and secure devices can access applications, regardless of location.

  • Zero Trust for Workloads: Applications running in the cloud, in data centers, and other virtualized environments that interact with one another. This pillar focuses on secure access when an API, a microservice or a container is accessing a database within an application. 

  • Zero Trust for the Workplace: This pillar focuses on secure access for any and all devices (including Internet of Things (IoT)) that connect to enterprise networks, such as user endpoints, physical and virtual servers, printers, cameras, HVAC systems, kiosks, infusion pumps, industrial control systems, and more.

Download the guide, Zero Trust: Going Beyond the Perimeter, now and learn about each pillar, the risks they address, options for implementation and proposed maturity levels.