{"id":91227,"date":"2020-06-15T13:45:23","date_gmt":"2020-06-15T20:45:23","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\/?p=91227"},"modified":"2023-09-26T08:42:29","modified_gmt":"2023-09-26T15:42:29","slug":"zero-trust-part-1-networking","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/06\/15\/zero-trust-part-1-networking\/","title":{"rendered":"Zero Trust\u2014Part 1: Networking"},"content":{"rendered":"\n
Enterprises used to be able to secure their corporate perimeters with traditional network controls and feel confident that they were keeping hackers out. However, in a mobile- and cloud-first world, in which the rate and the sophistication level of security attacks are increasing, they can no longer rely on this approach. Taking a Zero Trust<\/a> approach can help to ensure optimal security without compromising end user application experiences.<\/p>\n\n\n\n Microsoft has a long history of working with customers on how to protect against a broad range of security attacks and we are one of the largest producers of threat intelligence built on the variety of data that flows through our network.<\/p>\n\n\n\n Today, I\u2019d like to share how you can be successful implementing the Zero Trust model by rethinking your network strategy. Here\u2019s a video that will give you a quick overview:<\/p>\n\n\n