How other organizations are using SDP
Companies like Coca-cola are implementing SDP research into their vending machines, and Mazda is using SDP for their connected vehicles. Building Intelligence Inc. uses SDP in their access points for visitors, loading docks, and freight entrances to prevent terrorist attacks and theft.
This group is working to validate and protect the devices and connections on a network. The topics of group discourse are benefits, architectural references, and implementation of the SDP protocol.
No Meetings Currently Scheduled
Working Group Leadership
Jason Garbis is Senior Vice President of Products at Appgate, a leading provider of cloud- and hybrid-ready Zero Trust security products and services. At Appgate, he's responsible for the company's security product strategy and product management. He has over 30 years of product management, engineering, and consulting experience at security and technology firms. He is also co-chair of the Software Defined Perimeter (SDP) Work...
Founder and CTO of Vidder
Junaid Islam is the CTO and founder of Vidder which provides distributed access control solutions to Fortune 500 companies. Prior to founding Vidder, Junaid founded Bivio Networks which developed the first Gigabit speed software based securityin the industry. Earlier in his career Junaid helped create networking standards such as Frame Relay, ATM and MPLS while at StrataCom and Cisco.
In addition to his work in th...
Bob Flores is a co-founder and partner of Cognitio. Prior to this, Bob spent 31 years at the Central Intelligence Agency. While at CIA, Bob held various positions in the Directorate of Intelligence, Directorate of Support, and the National Clandestine Service. Toward the end of his career at the CIA, Bob spent three years as the CIA’s Chief Technology Officer where he wa...
Cloud Security Research for Zero Trust
CSA Research crowd-sources the knowledge and expertise of security experts and helps address the challenges and needs they’ve experienced, or seen others experience, within the cybersecurity field. Each publication is vendor-neutral and follows the peer review process outlined in the CSA Research Lifecycle. We recommend getting started by reading the following documents.
Software-Defined Perimeter (SDP) and Zero Trust
A Zero Trust implementation using Software-Defined Perimeter enables organizations to defend new variations of old attack methods that are constantly surfacing in existing network and infrastructure perimeter-centric networking models. Implementing SDP improves the security posture of businesses facing the challenge of continuously adapting to expanding attack surfaces that are increasingly more complex. This paper will show how SDP can be used to implement ZTNs and why SDP is applied to network connectivity, meaning it is agnostic of the underlying IP-based infrastructure and hones in on securing all connections using said infrastructure - it is the best architecture for achieving Zero Trust.
Software Defined Perimeter (SDP) Architecture Guide
This architecture guide leverages proven, standards-based components to stop network attacks against application infrastructure. This guide will help enterprises and practitioners understand the economic and technical benefits SDP can provide. It also assists users in implementing SDP in their organizations successfully. After reading this guide you will understand how SDP can be used in different environments, and be able to successfully deploy SDP solutions based on the architecture recommendations.
Software-Defined Perimeter as a DDoS Prevention Mechanism
Learn how to use SDP as a tool to prevent DDoS attacks. In this document we demonstrate its efficiency and effectiveness against several well known attacks, including HTTP Flood, TCP SYN, and UDP Reflection. The primary target audience for this document are people in security, enterprise architecture, and compliance roles within enterprises. These stakeholders will be largely for the evaluation, design, deployment, or operation of DDoS prevention solutions within their enterprise.
Zero Trust Architecture Expert Group
Webinars & Resources
Using SDP-based Zero Trust to Thwart Ransomware Attacks
Ransomware attacks have continued to increase and have become a major risk for both private and public enterprises. This session will provide an overview of ransomware attacks and the utilization of a SDP-based Zero Trust Architecture as an effective countermeasure.
Software Defined Perimeter Architecture Guide
SDP combines well-proven technical and architectural components to protect networked applications and infrastructure, more efficiently and effectively than with traditional network security tools. This webinar explains SDP and it’s benefits, as well as provides a preview of the architecture guide
SDP – The Yellow Brick Road to Zero Trust
In this webinar, you’ll learn how a Zero Trust implementation using SDP is applied to network connectivity, meaning it is agnostic of the underlying untrusted IP-based infrastructure, and hones in on securing connections. The webinar will delve into the steps to implement SDP and facilitate organizations to defend from new variations of old attack methods that are constantly surfacing in existing perimeter-centric networking and infrastructure models.
|Choosing ZTNA vendors amid zero-trust confusion||TechTarget||October 27, 2020|
|Understanding the zero trust-SDP relationship||TechTarget||October 29, 2020|
|Malicious SharePoint and OneDrive links are a phishing scammer’s dream||SC Magazine||October 22, 2020|
|Definition: software-defined perimeter (SDP)||SearchCloudSecurity||November 13, 2020|
|Implementing an SDP architecture for added network security||Tech Target||November 20, 2020|