Today’s “Zero Trust” implementations are like putting up a wall with multiple doors and allowing people to come and pick a lock on the door. We are then just relying on the locks. It is much better to put up a fence around and authenticate people before they get to the doors. One does want to see who is knocking, but one doesn’t want the threat to do bad things - like pick the locks. Authentication BEFORE access is the essence of real ”Zero Trust.” This presentation aims to show how Software Defined Perimeter is the optimal architecture for “Zero Trust”.
Prefer to access this resource without an account? Download it now.




