May 22, 2018
The world of technology is evolving causing us to rethink our previous methods of securing that technology. Previously, we would stand up a boundary that checked credentials before providing access to whatever was on the other side. This model however becomes less secure as more and more employees are working remote, working from non-corporate managed devices and working though third party applications. So if you no longer trust the device and you don't own the application, what do you do? That's where zero trust comes in.