Intelligent CIO North America Issue 12 | Page 41

FEATURE : ZERO TRUST
The Zero Trust access model is not a new concept and CISOs who are planning to implement it can choose from a wide array of technologies that are designed to meet the requirements of the National Institute of Standards and Technology ( NIST ) Zero Trust Architecture . But getting all these often isolated technologies to work together to prevent security lapses can be challenging .
Focusing on three key areas of Zero Trust access With ZTA , the entire concept of trusted and untrusted zones no longer applies ; location needs to be taken out of the equation entirely . The most effective strategy is a holistic approach that delivers visibility and control by focusing on three key areas : who is on the network , what is on the network and what happens to managed devices when they leave the network .
1 . Who is on the network
Every digital enterprise has a variety of users . Traditional employees access the network , but often contractors , supply chain partners and even customers
Peter Newton , Senior Director of Product Marketing , Fortinet
www . intelligentcio . com INTELLIGENTCIO NORTH AMERICA 41