The Circle of Zero Trust
Before we start to look at "The Circle of Zero Trust™ it's important we first understand a little more about the concept of zero trust.

That’s right it is a concept, and a framework; not a product, service or platform that some may have you believe. Zero Trust (ZT) as a concept was first proposed by Forrester Research as a Blue Print for Security Architecture.

The main premise of ZT is the internet has become more ubiquitous and we are constantly connected; the perimeter demarcation points have moved; trust is no longer inherent. The old castle and moat approach where a heavily guarded entrance (perimeter security) to validate access and then grant trust is no longer sufficient for today’s users, applications and networks that are perimeter less,  hyper-connected and cannot be trusted.  The Zero Trust approach and principals are to “never trust, always verify”

The five main points of Zero Trust *
* Zero Trust Networks, Building Secure Systems in Untrusted Networks | Author: Evan Gilman & Doug Barth |
The networks are always assumed
to be hostile.
External and internal threats exist
on the network at all times.
Networks locality is not sufficient for
deciding trust in a network.
Every device, user and network
flow is authenticated and
Polices must be dynamic and
calculated from as many sources
of data as possible.
Now we have a basic understanding of Zero Trust we can introduce
CyberCyte's Circle of Zero Trust,
which is an extended framework of solutions within our platform that helps organisations in their journey to achieving Zero Trust. Each solution is fully integrated and also available standalone.
The modules within the circle, are as follows:
  • Identity management and authentication services for users and applications.
  • Networks and device access control.
  • DNS Security and External application Validation.
  • Complete Visibility into Users, Device and Networks.

Would you like to learn more about how to protect your business?

© 2019 CyberCyte. All Rights Reserved.