"if cloud-native zero trust computing is the future-and we believe it is-then our solution is unmatched when it comes to providing scale, security, and user experience," Potti said. Scalable zero trust that includes agentless support through Google Chrome, a global network of 144 edge locations in more than 200 countries, DDoS protection tested against 2.5 TB/sec attacks, and verifiable platform security.Ĭontinuous, real-time, end-to-end protection with embedded data and threat protection, phishing-resistant authentication, continuous authorization, security from user-to-app and app-to-app based on BeyondProd, and automated public trust SSL certificate lifecycle management.Įxtensibility and openness that allows for ecosystems built around BeyondCorp Alliance partners, endpoint openness that incorporates partner signals for building access policies, and app extensibility that allows integration with Citrix, VMware, and other partner companies.
Zero trust treats each element on a network as potentially dangerous until it proves otherwise: Each time a user wants to access a new network segment, open a different file, or launch a new application they're vetted by zero trust software to determine if they're still who they say they are, and whether their traffic is suspicious in any way.īeyondCorp Enterprise, Potti said, delivers three key benefits to customers and partners: As more elements of business computing move to the cloud or are distributed to remote workers, castle and moat security has been proven inadequate time and again as attackers manage to break into networks and wreak havoc.
This document contains an abstract definition of zero trust architecture (ZTA) and gives general deployment models and use cases where zero trust could improve an enterprise's overall information technology security posture.Zero trust security is a completely different security paradigm from common "castle and moat" security designs that treat enterprise networks as places to be hardened against outside attack. Zero trust focus on protecting resources (assets, services, workflows, network accounts, etc.), not network segments, as the network location is no longer seen as the prime component to the security posture of the resource. Zero trust is a response to enterprise network trends that include remote users, bring your own device (BYOD), and cloud- based assets that are not located within an enterprise-owned network boundary. Authentication and authorization (both subject and device) are discrete functions performed before a session to an enterprise resource is established.
Zero trust assumes there is no implicit trust granted to assets or user accounts based solely on their physical or network location (i.e., local area networks versus the internet) or based on asset ownership (enterprise or personally owned). A zero trust architecture (ZTA) uses zero trust principles to plan industrial and enterprise infrastructure and workflows. Zero trust (ZT) is the term for an evolving set of cybersecurity paradigms that move defenses from static, network- based perimeters to focus on users, assets, and resources.