Abstract
As identity becomes the new perimeter, there is an ongoing trend that suggests that a ‘zero trust’ security model can augment conventionalfirewalls and VPNs to fortify an organisation's security posture. This movement towards more available access but with dynamic authorisation is growing asIT becomes more hybrid and applications migrate to the cloud. Prior requirements of forcing users to go through the corporate network – for example,using simple two-factor authentication registration – will change as well. This movement towards more available access but with dynamic authorisation is growing as ITbecomes more hybrid and applications migrate to the cloud. Prior requirements of forcing users to go through the corporate network will change as well.And software defined perimeter (SDP) technology can deliver the new trust models we need, argues Scott Gordon of Pulse Secure.
Subject
Information Systems and Management,Computer Networks and Communications,Safety, Risk, Reliability and Quality
Reference1 articles.
1. ‘2019 Technology Spending Intentions Survey’. Enterprise Strategy Group (ESG); https://www.esg-global.com/2019-technology-spending accessed May 2019
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Digital Transformation, Leadership, and Markets;Blockchain and Other Emerging Technologies for Digital Business Strategies;2022
2. Zero Trust User Access and Identity Security in Smart Grid Based SCADA Systems;Advances in Intelligent Systems and Computing;2021