Users whose digital lives are increasingly mobile don’t want to be tied to their desks, and an effective security strategy must be flexible enough to protect access from boardrooms and bars, cubicles and coffee shops alike. And organizations relying on cloud-first tools want to enable access for their users without reducing velocity. To do this, companies must consider checking security health and enforcing policy at the application level, whether the user logging in is outside or inside the network perimeter.
One answer to these challenges is the “zero-trust network” model: all networks and devices are treated as untrusted until proven otherwise, and their health is checked each time a user connects to a protected resource. This approach depends on visibility into whether basic device and network security standards are met. It also requires the ability to enforce granular policy controls based on the results of that health check.
The perimeter is disappearing, and cloud migration isn't slowing down… find out how you can get a head start on what’s next!
Zoe Lindsey is Duo’s Advocacy Manager, where she educates and advises organizations with unique compliance challenges including the healthcare, government, and financial industries on strong security policy and unified access security strategies. She has been hooked on tech since getting her first Commodore 64 at age 10, and joined Duo with a background in cellular and medical technology.