At this year's edition of the RSA Conference, held in San Francisco March 4‒7, 2019, the "zero trust" approach to security was more visible than ever. Ovum highlights three areas of technology that embody zero trust, namely privileged access management (PAM), software-defined perimeter (SDP), and micro-segmentation.
- Zero trust is a phrase originally coined by an analyst in 2010 to describe what he perceived as a new, more restrictive approach to security. It had evolved in response to an ever more active, complex, and dangerous threat landscape in which breaches were becoming more likely and more numerous, a trend which has only intensified in the years since.
Features and Benefits
- Describes why and how zero trust has evolved.
- Explains where zero trust is appearing now.
Key questions answered
- What is SDP and how can it replace VPN?
- What is PAM?
Table of contents
Zero trust is a response to a burgeoning threat landscape
PAM's least privilege is a zero trust approach
SDP takes zero trust in remote access
Micro-segmentation is zero trust applied to workloads