Skip Navigation or Skip to Content
Person, Clothing, Advertisement, Poster, Flyer, Paper, Suit, Coat, Overcoat, Crowd

Zero Trust Security vs. Zero Touch Security 

Nandita Bery

ago 5 2022
For the past years, if you were to whip a cybersecurity bingo card out in conferences, you would undoubtedly mark “blockchain,” “defense in depth,” “security by design,” and recently, “zero trust” aka ZT. Zero trust has been getting all the buzz lately for shifting defenses from traditional, network-based perimeters to focus on users, assets, and behaviors. Zero trust, as the name implies, assumes there is no implicit trust granted to users or devices.  Zero trust employs a more granular perimeter control based on identity (i.e., users), devices, geolocation, and historical usage patterns to identify whether something is to be trusted…

The post Zero Trust Security vs. Zero Touch Security  appeared first on Interconnections - The Equinix Blog.

Leer más

Publicado por Nandita Bery el ago 5 2022

Join the Equinix Talent Network

¿No tú?

Le hemos enviado un código por correo electrónico para verificar su identidad. Por favor revise su carpeta de spam/basura si no recibe el correo electrónico en su bandeja de entrada.

¡Gracias!