Search
Appgate SDP
SDP Overview
Learn how Appgate SDP reduces risk and complexity, and why it's the industry's most comprehensive Zero Trust network access solution.
How Appgate SDP Works
Find out about the inner-workings of the most flexible and adaptable Zero Trust Network Access solution available today.
SDP Integrations
Explore security, IT and business-system integrations that can enhance and help you adapt Appgate SDP to your existing workflows
SDP for Developers
Access developer tools and resources to maximize the value of your Appgate SDP deployment.
Zero Trust Network Access for:
Risk-Based Authentication
Overview
Learn how Risk-Based Authentication provides a frictionless, intelligent and data-informed approach to user authentication.
Strong Authentication
Find out how you can provide secure, frictionless access with the right multi-factor authentication method.
Transaction Monitoring
Explore the tools you can use to intelligently identify and prevent online fraud.
Behavioral Biometrics Service
Learn how behavioral analysis and machine learning stop fraudulent online web activity in real-time.
Secure Consumer Access for:
Digital Threat Protection
Overview
Discover how you can gain unparalleled threat visibility and the risk management tools that enable early identification and elimination of potential attacks.
Key Features
Take a deep dive into the features and tools contained within our industry-leading Digital Threat Protection (DTP) solution.
SECURE NETWORK ACCESS

George WilkesDecember 26, 2021

PODCAST: Getting Real About Zero Trust

Hype and marketing have created a buzz about Zero Trust that isn’t always true to its core. Contrary to what some believe, Zero Trust isn’t a product. So, what is it, exactly?

Share

Zero Trust security is often a misunderstood and misused term. For the podcast series, Zero Trust Thirty, we break down what Zero Trust is and isn’t, explain its origin and offer ways you can start to frame it up within your organization.

Listen to the episode "Getting Real About Zero Trust" featuring Jason Garbis and Jerry Chapman, co-authors of Zero Trust Security: An Enterprise Guide, delivering insightful guidance on:

Listen Now:


What’s bugging our guests?


Jerry Chapman

What’s bugging me? Just getting started on projects around Zero Trust whether it’s identity related, whether it’s network related, endpoint, mobile security—you pick it—cloud enablement. Getting started, that bugs me. Let’s just do this thing and move forward.

Jason Garbis

For me, it’s very similar. I think organizations do have that urgency around security and around moving forward with Zero Trust. But they sometimes stumble into this pit of despair around paralysis by analysis, which is, “OK, we want to do this. Now let’s spend all this time, months and months and months, looking around every possible asset.”

It’s a tough balancing act and I understand wanting to move quickly and wanting to not make mistakes … understand where you’re going and plan things out. But I think you can’t let perfect be the enemy of good. It’s important to get started, be nimble and adjust and adapt.

Three common Zero Trust security roadblocks and how to avoid them


Many are eager to start their Zero Trust security journey, but hesitate when thinking about complex issues like how to apply it to secure a hybrid workforce or how to stop attacks like ransomware. In this Zero Trust Thirty episode, Jason and Jerry share typical pain points and how to advance past them:

  1. Misunderstanding the depth of Zero Trust. Policies like microsegmentation or multi-factor authentication (MFA) are important tools, but Zero Trust is more holistic than that. There is no one-stop shop or quick solution. In fact, Zero Trust security isn’t so much about the technology, but it's about adopting a mindset of verifying access between users and resources. This is a culture change that must come from the top of an organization and trickle down.
  2. Paralysis by analysis. Enterprises are wasting too much time evaluating a situation and not implementing Zero Trust security strategies. It’s daunting to audit your network and see holes and how many access control and networking mechanisms must be accounted for. Instead of inaction or contemplating if you really need to do this for the umpteenth time … just get started.
  3. Trying to boil the ocean. There’s an implementation maturity curve for Zero Trust security and it’s not feasible to do it all at once. Start by looking for one pain point in your organization or a new project that doesn’t yet have security infrastructure. Start small and scale from there. There is no big switch to flip. Build a road map so that instead of taking on overwhelming tasks like restructuring a network, take manageable steps to a more mature security posture.

Here are more resources that illustrate how Zero Trust security helps organizations overcome the challenges of business and an evolving threat landscape.

2021 Zero Trust Market Dynamics study, expert Q&A with Dr. Chase Cunningham
5-step guide to simplify VPN to ZTNA migration
Demo Appgate SDP

Receive News and Updates From Appgate