The perimeter is dead: Long live the micro perimeter.
In the Cloud Generation, data is the core of security architecture. We can't rely on firewalls any longer, as your sensitive data is just as likely in transit back and forth to the cloud as it is sitting inside your perimeter.
In a Zero Trust model, you cannot trust anything in or out of your network: creating a new type of data-centric perimeter around information and protecting it with strong encryption techniques tied to intelligent authentication is the best security approach. Blindly allowing users to access the data without checking their identity negates the entire security stack.
Zero Trust implementation relies on protections that provide the most visibility into who is accessing your data, both on premises and in the cloud. Data should only be brought 'into the clear' when all risk factors surrounding the user and their authenticating device are evaluated.
Simply put: protect your data and trust no one. Symantec Zero Trust data solutions include:
- Data Loss Prevention
- Information Centric Security (ICS)
- Encryption
- Validation and ID Protection
- Information Centric Tagging
- Information Centric Analytics