eBooks/eGuides

Data Center and Hybrid Cloud for Dummies

Issue link: https://insights.oneneck.com/i/1458399

Contents of this Issue

Navigation

Page 38 of 82

CHAPTER 3 Delivering Consistent Security Using Zero Trust 33 These materials are © 2020 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited. Chapter 3 IN THIS CHAPTER » Seeing your entire protect surface » Segmenting data centers and hybrid cloud environments » Migrating security policies dynamically with hybrid cloud workloads Delivering Consistent Security Using Zero Trust C onventional security models operate on the outdated assumption that you can trust everything inside your net- work. However, given the increased sophistication of attacks and insider threats, you need new security measures to stop them from spreading once they're inside. Because traditional security models are designed to protect your perimeter, threats that get inside your network often go undetected and are free to morph and move wherever they choose to extract sensitive busi- ness data. In the digital world, trust is a vulnerability. A Zero Trust approach to security helps prevent data breaches by eliminating the concept of inherent trust in an organization's data center or hybrid cloud environment. Rooted in the princi- ple of "never trust, always verify." The key to adopting a Zero Trust approach in data centers and hybrid cloud environments lies in leveraging a multi-layered network security posture that delivers consistent network visibility, segmentation and micro- segmentation, and threat detection and response across physi- cal, virtual, and containerized infrastructures. Preventing lateral movement relies on security that is context-based, dynamic, and integrated throughout your organization.

Articles in this issue

Archives of this issue

view archives of eBooks/eGuides - Data Center and Hybrid Cloud for Dummies