The concept of “zero-trust security” has changed the approach to cloud architecture design, extending the focus from the perimeter-based security to the entire network.
Based on the principle “Never trust, always verify,” the zero-trust security model treats every request for network access inside a firewall as a suspicious activity. By removing trust between network nodes, this approach protects a cloud environment against east–west traffic or lateral-moving traffic inside the data center. The result is a reduced risk of network breach or disruption even in organizations and environments where hundreds or thousands of users are accessing the network remotely.
In this webinar, phoenixNAP’s EVP of Products, William Bell talks about the foundation of zero trust security cloud architecture and best practices for its implementation. The session particularly focuses on the the capabilities of VMware NSX and its deployment on phoenixNAP’s secure cloud platform – Data Security Cloud.
• Overview of threats to cloud environments
• Key principles of zero-trust security
• Best practices for implementing ZT model
• Features of VMware NSX microsegmentation
• Data Security Cloud architecture overview
Publisher: phoenixNAP Global IT Services
You can watch this video also at the source.