In the early days of information security, implementing a perimeter defense was enough to keep your company safe. But today, with so many points of access, a Zero Trust model is necessary. In this episode of B2B Tech Talk, Keri speaks with Ingram Micro tech consultant,
Patrick Smith.
Keri and Patrick discuss:
- Three main concepts of Zero Trust security
- How Zero Trust secures customer data
- The future of the Zero Trust security model
What is Zero Trust?
Zero Trust is an information security architecture that encourages organizations not to trust any entity outside or inside their perimeters. It focuses on securing small groups of resources rather than network segments.
3 components of Zero Trust
There are three main concepts of the Zero Trust framework, explains Patrick.
- All resources are accessed in a secure manner, regardless of their location.
- Access control is on a need-to-know basis
- All traffic on the network is inspected and logged
"Access control is on a need-to-know basis, and should be strictly enforced." — Patrick Smith
Learn more about Zero Trust
To learn more about implementing a Zero Trust security model,
read the draft here or contact your Ingram Micro rep.