![]() ![]() It could be argued that zero-trust networking builds on initial work done by the Jericho Forum in the early 2000s. Conceptually, the zero-trust model is similar to the positive security model that has been around for years and utilized by proxy firewalls and application whitelisting products – essentially, deny all access by default, and only allow those users and devices that are expressly permitted by policy. Google's BeyondCorp reference architecture was published in a series of papers in 2014, and was recently commercialized as the Identity-Aware Proxy and Context-aware access.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |