Cloud 101CircleEventsBlog

Download Publication

Software-Defined Perimeter (SDP) and Zero Trust - Chinese Translation
Software-Defined Perimeter (SDP) and Zero Trust - Chinese Translation

Software-Defined Perimeter (SDP) and Zero Trust - Chinese Translation

Release Date: 09/21/2020

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translated content falls outside of the CSA Research Lifecycle. For any questions and feedback, contact [email protected].

A Zero Trust implementation using Software-Defined Perimeter enables organizations to defend new variations of old attack methods that are constantly surfacing in existing network and infrastructure perimeter-centric networking models. Implementing SDP improves the security posture of businesses facing the challenge of continuously adapting to expanding attack surfaces that are increasingly more complex. This paper will show how SDP can be used to implement ZTNs and why SDP is applied to network connectivity, meaning it is agnostic of the underlying IP-based infrastructure and hones in on securing all connections using said infrastructure - it is the best architecture for achieving Zero Trust.

Download this Resource

Prefer to access this resource without an account? Download it now.

Bookmark
Share
Related resources
Defining the Zero Trust Project Surface - Korean Translation
Defining the Zero Trust Project Surface - Korea...
Defining the Zero Trust Protect Surface
Defining the Zero Trust Protect Surface
Communicating the Business Value of Zero Trust
Communicating the Business Value of Zero Trust
This Year’s Zero Trust Opportunity for Security Professionals
This Year’s Zero Trust Opportunity for Security Professionals
Published: 04/26/2024
How to Prepare Your Workforce to Secure Your Cloud Infrastructure with Zero Trust
How to Prepare Your Workforce to Secure Your Cloud Infrastructure w...
Published: 04/24/2024
What’s in a Name? Defining Zero Trust for Leaders
What’s in a Name? Defining Zero Trust for Leaders
Published: 04/22/2024
Implementing a Data-Centric Approach to Security
Implementing a Data-Centric Approach to Security
Published: 04/19/2024
Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training