{"id":5102,"date":"2014-03-25T14:00:37","date_gmt":"2014-03-25T21:00:37","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=5102"},"modified":"2014-03-25T11:45:42","modified_gmt":"2014-03-25T18:45:42","slug":"understanding-zero-trust-approach-network-segmentation","status":"publish","type":"post","link":"https:\/\/www2.paloaltonetworks.com\/blog\/2014\/03\/understanding-zero-trust-approach-network-segmentation\/","title":{"rendered":"Understanding a Zero Trust Approach to Network Segmentation"},"content":{"rendered":"<p>Lately <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2014\/03\/zero-trust-architecture-means-security\/\" target=\"_blank\">you\u2019ve heard us talking a lot about Zero Trust<\/a>, an architectural approach to enterprise security that uses \u201cnever trust, always verify\u201d as its guiding principle.<\/p>\n<p>First proposed by Forrester Research, a Zero Trust approach means there is no default trust for any entity, regardless of what it is and its location on or relative to the corporate network. With Zero Trust boundaries, you\u2019re compartmentalizing different segments of your network. You can protect critical intellectual property, reduce the exposure of vulnerable systems, and prevent the lateral movement of malware throughout your network in a way other segmentation solutions \u2013 including the use of VLANs \u2013 do not.<!--more--><\/p>\n<p>True Zero Trust segmentation requires an enterprise security platform that addresses applications, users and content \u2013 and that\u2019s exactly what Palo Alto Networks provides through secure access, inspection of all traffic, and advanced threat protection.<\/p>\n<p>We\u2019re pleased to share a range of new resources to help you get started with critical Zero Trust concepts:<\/p>\n<ul>\n<li>Our <a href=\"https:\/\/www.paloaltonetworks.com\/solutions\/initiative\/network-segmentation.html\" target=\"_blank\">Zero Trust resource page<\/a> includes detailed discussions of the Zero Trust concept and links to videos, Forrester research and how we address segmentation forPCI compliance.<\/li>\n<\/ul>\n<ul>\n<li>Our <a href=\"https:\/\/www.paloaltonetworks.com\/resources\/whitepapers\/zero-trust-approach-to-network-security.html\" target=\"_blank\">Zero Trust whitepaper<\/a> itemizes the essential criteria and capabilities required of a Zero Trust solution, and also how the Palo Alto Networks next-generation security platform delivers on these requirements.<\/li>\n<\/ul>\n<ul>\n<li>Our <a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMTkzOA==\/\" target=\"_blank\">upcoming Zero Trust event in New York City<\/a>, this <b>Thursday, March 27 at 12:00 p.m.<\/b> <b>EST<\/b>, will provide guidance on how to implement a Zero Trust model from Forrester Research Vice President and Principal Analyst John Kindervag and Palo Alto Networks technical experts. <a href=\"https:\/\/events.paloaltonetworks.com\/dmVyaXRlMTkzOA==\/\" target=\"_blank\">Register now<\/a>.<\/li>\n<\/ul>\n<p>And if you\u2019ll be joining us at Ignite 2014 in Las Vegas next week, we will have <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2014\/03\/spotlight-ignite-2014-assessing-modern-data-centers\/\" target=\"_blank\">several sessions devoted to Zero Trust<\/a> as part of our Modern Data Centers track. <a href=\"http:\/\/bit.ly\/1baob3H\" rel=\"nofollow,noopener\"  target=\"_blank\">Register now for Ignite<\/a> if you haven\u2019t already, and we\u2019ll see you there!<\/p>\n<p>In the meantime, check out a recent video with John Kindervag and I discussing Zero Trust and what it means for customers:<\/p>\n<p><div class=\"styleIt\" style=\"width:auto;height:auto;\"><lite-youtube videoid=\"AOinIottWuE\" playlistid=\"UU2UPStk47kvhBn8P7Q5BaAg\"><\/lite-youtube><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Lately you\u2019ve heard us talking a lot about Zero Trust, an architectural approach to enterprise security that uses \u201cnever trust, always verify\u201d as its guiding principle. First proposed by Forrester Research, a &hellip;<\/p>\n","protected":false},"author":40,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[75],"tags":[357,80,73],"coauthors":[771],"class_list":["post-5102","post","type-post","status-publish","format-standard","hentry","category-data-center-2","tag-john-kindervag","tag-network-segmentation","tag-zero-trust"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/5102","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=5102"}],"version-history":[{"count":1,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/5102\/revisions"}],"predecessor-version":[{"id":5103,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/5102\/revisions\/5103"}],"wp:attachment":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=5102"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=5102"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=5102"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=5102"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}