{"id":6470,"date":"2021-04-28T22:39:50","date_gmt":"2021-04-28T22:39:50","guid":{"rendered":"https:\/\/www.microsoft.com\/en-ca\/industry\/blog\/?p=6470"},"modified":"2021-04-28T22:39:50","modified_gmt":"2021-04-28T22:39:50","slug":"zero-trust-for-networking","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-ca\/industry\/blog\/uncategorized\/2021\/04\/28\/zero-trust-for-networking\/","title":{"rendered":"Zero Trust for networking"},"content":{"rendered":"
<\/p>\n
Over the last year, the\u00a0demand for cloud-based services and applications has dramatically increased and the need to scale pushed to new levels.\u00a0We are moving away from an era where networks were clearly defined and usually specific to a certain location. Now there isn’t necessarily a contained\/defined network to secure, but instead a vast portfolio of devices and networks, all linked by the cloud. Cybercriminals however are taking advantage of this shift, with increase occurring in DDoS attacks, ransomware and phishing campaigns.<\/p>\n
With the trend organizations are looking towards a Zero Trust model, where instead of believing everything behind the corporate firewall is safe, the Zero Trust strategy principals Verify explicitly, Use Least-privileged access and Assume Breach.<\/p>\n
In the Zero Trust model for Networks, there are three key objectives:<\/p>\n
As organizations look to deployment Zero Trust framework for securing networks:<\/p>\n
Get Started on your Zero Trust journey for Networks<\/p>\n