Skip navigation

Moving Beyond the Perimeter: Part 2

In this white paper, you’ll find::

  • Steps to take to implement BeyondCorp
  • How to enroll users and endpoints, and mark devices as ‘trusted’
  • How to create and enforce access policies
  • The different stages of security maturity

How to Implement the BeyondCorp Security Model

In part 1 of our white paper series, Moving Beyond the Perimeter: The Theory Behind Google’s BeyondCorp Security Model, we described the need for a new enterprise architecture that addresses new risks beyond the perimeter.

In part 2, we walk you through how to implement a BeyondCorp security model at your organization with detailed steps, caveats and questions to ask.

  • First, organizations need to enroll users and endpoints into inventories.
  • Then they can identify endpoints as “trusted” using digital certificates.
  • Finally, they can create access policies based on the authenticated combination of users and endpoints.

Learn about the other components of BeyondCorp, including single sign-on, device inspection and much more. Part 2 also provides an outline of the different maturity stages of enterprise security evolution, and who can reach each stage.

Find out how you can implement a similar security model in your organization with the help of Duo Beyond:

  • Identify corporate vs. personal devices
  • Easy certificate deployment
  • Block untrusted endpoints
  • Give users secure access to internal applications
Preview the ebook: