{"id":133439,"date":"2021-05-19T12:00:06","date_gmt":"2021-05-19T19:00:06","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=133439"},"modified":"2021-05-19T11:54:56","modified_gmt":"2021-05-19T18:54:56","slug":"time-for-zero-trust","status":"publish","type":"post","link":"https:\/\/www2.paloaltonetworks.com\/blog\/2021\/05\/time-for-zero-trust\/","title":{"rendered":"It\u2019s Time for Zero Trust"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">In the past, an employee\u2019s ability to access resources and work securely has been driven by a simple question: Are you at work?\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">There are many issues associated with a security architecture that presumes trust based on physical location. On the network, you get access to internal applications. But what if you aren\u2019t an employee? What if your device is compromised? What if you shouldn\u2019t have access to all of these applications? Because of the security implications associated with an architecture based on these questions, the concept of <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/cyberpedia\/what-is-a-zero-trust-architecture\"><span style=\"font-weight: 400;\">Zero Trust<\/span><\/a><span style=\"font-weight: 400;\"> was invented more than a decade ago. But few embraced it.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Now, we are at a digital inflection point: The abrupt shift to remote work is evolving toward a permanently hybrid workforce and the applications powering business outcomes are increasingly in the cloud. Organizations <\/span><i><span style=\"font-weight: 400;\">must<\/span><\/i><span style=\"font-weight: 400;\"> move beyond the mindset of using implied trust in access and security. A Zero Trust approach removes implied trust everywhere to provide a better security posture.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">For every connection from any user to any application, the Zero Trust promise is to verify who the user is, the type and state of the device they are using, and the application they are accessing, to decide whether it is safe or not. <\/span><i><span style=\"font-weight: 400;\">And <\/span><\/i><span style=\"font-weight: 400;\">do this regardless of where the user or the app is located. From a user\u2019s perspective this means consistent, easy and safe access to all applications you need.\u00a0<\/span><\/p>\n<p><b>This can happen today. <\/b><span style=\"font-weight: 400;\">This is how you can achieve it:\u00a0<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Verify all users, devices and applications:<\/b><span style=\"font-weight: 400;\"> Always verify the identity of the user, the integrity of the host they are using and the application they seek to access, irrespective of where the user, device or application may be.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Apply context-based access<\/b><span style=\"font-weight: 400;\">: Every access policy decision should consider user, device and application context, ensuring consistent security <\/span><i><span style=\"font-weight: 400;\">and<\/span><\/i><span style=\"font-weight: 400;\"> user experience.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Secure all content<\/b><span style=\"font-weight: 400;\">: Continuously inspect all content to verify that it is legitimate, safe and secure, and examine all data transactions to prevent enterprise data loss.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Continuously monitor and analyze all security infrastructure<\/b><span style=\"font-weight: 400;\">: Continuously monitor all connections and content for signs of anomalous or malicious activity to help uncover gaps in your implementation, and use this data to continuously analyze and fine tune your policies to improve the security of the system.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">These are the core building blocks of a Zero Trust architecture.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><span style=\"font-weight: 400;\">How We Can Help<\/span><\/h2>\n<p><i><span style=\"font-weight: 400;\">We were made for this.<\/span><\/i><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Our products are engineered from the ground up to continuously and reliably identify all users, devices, and applications \u2013 no matter where they are \u2013 allowing you to consistently apply context-based policies across your entire organization. We developed features like User-ID, App-ID, Device-ID and policy-based authentication, and our latest release takes this to a new level.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Our security engines comprehensively secure all content across all applications \u2013 not <\/span><i><span style=\"font-weight: 400;\">just<\/span><\/i><span style=\"font-weight: 400;\"> what\u2019s bound for the internet \u2013 to keep your users, devices, apps and data safe. These security services are truly integrated and core to how we secure all enterprise environments, battle tested over years of real-world use.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Aided by intelligent, context-rich data and visibility into all activity, you can enable your business, improve your security posture and empower your SOC to rapidly identify and eliminate malicious activity.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">As users embrace a hybrid workplace, Palo Alto Networks is uniquely positioned to deliver on the promise of Zero Trust. For your workforce that will spend all or part of their time being remote and a part of their time at the workplace, you can optimize the user experience by leveraging consistent capabilities across our cloud-native service, hardware and software form factors.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">And with our latest release we\u2019ve turned up the dial up once again \u2013 you can learn more about that in Anand Oswal\u2019s post, \u201c<\/span><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2021\/05\/zero-trust-for-network-security\/\"><span style=\"font-weight: 400;\">Palo Alto Networks Introduces Complete Zero Trust Network Security<\/span><\/a><span style=\"font-weight: 400;\">.\u201d<\/span><\/p>\n<p><span style=\"font-weight: 400;\">We\u2019re incredibly excited about these new innovations, and we are eager to partner with you on your cybersecurity journey.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Learn why it\u2019s time for Zero Trust, the core building blocks of a Zero Trust architecture and how we can help.<\/p>\n","protected":false},"author":208,"featured_media":128794,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[308,6724,6717],"tags":[73,7725],"coauthors":[2224],"class_list":["post-133439","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-announcement","category-points-of-view","category-products-and-services","tag-zero-trust","tag-zero-trust-network-security","net_sec_category-next-generation-firewalls","net_sec_category-zero-trust-security"],"jetpack_featured_media_url":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2021\/03\/Hallway-of-Glass.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/133439","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/208"}],"replies":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=133439"}],"version-history":[{"count":5,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/133439\/revisions"}],"predecessor-version":[{"id":133537,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/133439\/revisions\/133537"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/128794"}],"wp:attachment":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=133439"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=133439"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=133439"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=133439"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}