Hi. Welcome to Ingram Micro.

Please choose your role, so we can direct you to what you’re looking for.

If you’d like to learn more about Ingram Micro global initiatives and operations, visit ingrammicro.com.

3 Main Concepts of Zero Trust

March 19, 2020

3 Main Concepts of Zero Trust
 
powered by Sounder

In the early days of information security, implementing a perimeter defense was enough to keep your company safe. But today, with so many points of access, a Zero Trust model is necessary. In this episode of B2B Tech Talk, Keri speaks with Ingram Micro tech consultant, Patrick Smith.
 

Keri and Patrick discuss:

  • Three main concepts of Zero Trust security
  • How Zero Trust secures customer data
  • The future of the Zero Trust security model

What is Zero Trust?

Zero Trust is an information security architecture that encourages organizations not to trust any entity outside or inside their perimeters. It focuses on securing small groups of resources rather than network segments.
 

3 components of Zero Trust

There are three main concepts of the Zero Trust framework, explains Patrick.
  1. All resources are accessed in a secure manner, regardless of their location.
  2. Access control is on a need-to-know basis
  3. All traffic on the network is inspected and logged
 
"Access control is on a need-to-know basis, and should be strictly enforced." — Patrick Smith
 

Learn more about Zero Trust

To learn more about implementing a Zero Trust security model, read the draft here or contact your Ingram Micro rep.