Security Evolves Toward Zero Trust

Security Evolves Toward Zero Trust

Akamai
Published by: Research Desk Released: Oct 04, 2019

In a networked enterprise, under constant threat of cyberattack, the conventional protectors – perimeters and passwords – are obsolete. Security must move from the network layer to the application layer, with mutual verification between application and user. A Zero Trust approach minimizes risk by scrutinizing all users and all traffic.