{"id":6980,"date":"2020-12-10T16:12:20","date_gmt":"2020-12-10T10:42:20","guid":{"rendered":"https:\/\/www.hexnode.com\/blogs\/?p=6980"},"modified":"2022-07-05T11:56:30","modified_gmt":"2022-07-05T06:26:30","slug":"is-zero-trust-model-the-final-frontier-in-enterprise-security","status":"publish","type":"post","link":"https:\/\/www.hexnode.com\/blogs\/is-zero-trust-model-the-final-frontier-in-enterprise-security\/","title":{"rendered":"Is Zero Trust model the final frontier in enterprise security?"},"content":{"rendered":"<p>The network firewall as we know was established somewhere in the \u201990s. System admins everywhere deployed these \u201cperimeters\u201d which essentially isolated the organization&#8217;s\u00a0internal servers from the internet. Things were going great until the cyber attackers figured out how they could pierce the perimeter.\u00a0They knew about the perimeter of the firewall; they also knew that customers and trusted suppliers were given access through the perimeter. So instead of attacking the big company, cybercriminals started targeting these trusted partners and customers.\u00a0It came to a point where the firewall had lost most of its value and the attackers didn\u2019t really care about it anymore.<\/p>\n<p>At this critical point in time, some cybersecurity enthusiasts\u00a0started suggesting\u00a0the\u00a0idea of\u00a0eliminating the perimeter. These people were tired of the network perimeter.\u00a0\u00a0They believed that\u00a0establishing a\u00a0mere\u00a0firewall as\u00a0the protection\u00a0for\u00a0your internal\u00a0servers\u00a0wasn&#8217;t really cutting it.\u00a0 Cyber attackers were adapting.\u00a0People were asking for a change, and what started out as a discussion between a few enthusiasts in the Jericho Forums in 2004, gained traction and was even given a name in 2010.\u00a0The\u00a0Zero Trust\u00a0Model.<\/p>\n<p>Recently, our CMO and Director of Operations, Rachana Vijayan sat down with Dr. Chase Cunningham also known as Dr. Zero Trust, at HexCon20 to have a talk. He is a cybersecurity expert and an advisor to several federal bodies in the US. He has also authored a book called <a href=\"https:\/\/www.amazon.com\/gp\/product\/B084ZN2HBD\/ref=dbs_a_def_rwt_hsch_vapi_tkin_p1_i0\">Cyber Warfare- Truth, Tactics, and Strategies<\/a>. He talked about the zero-trust model and how it could well be the future of enterprise-level cybersecurity. Some of the key takeaways from his talk are the backbone of this article.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-6996\" src=\"https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2020\/12\/Zero-trust-model.jpg\" alt=\"Zero trust model\" width=\"1920\" height=\"1280\" srcset=\"https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2020\/12\/Zero-trust-model.jpg?format=webp 1920w, https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2020\/12\/Zero-trust-model-300x200.jpg?format=webp 300w, https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2020\/12\/Zero-trust-model-1024x683.jpg?format=webp 1024w, https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2020\/12\/Zero-trust-model-768x512.jpg?format=webp 768w, https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2020\/12\/Zero-trust-model-1536x1024.jpg?format=webp 1536w\" sizes=\"auto, (max-width: 1920px) 100vw, 1920px\" \/><\/p>\n<h2>Where to start?<\/h2>\n<p>The question is, where should organizations focus their efforts\u00a0early on when it comes to zero\u00a0trusts for\u00a0optimal ROI? Sounds like quite a loaded question but the answer is somewhat simple. As Dr. Cunningham would say, \u201cfor most organizations the answer would be binary &#8220;I.e., focus on\u00a0users and devices. One of the fundamentals of\u00a0zero trust is you do not trust the user nor do you trust the device. So,\u00a0in essence, the users have to prove that they are who they say they are and the devices have to prove it is what it is.\u00a0This is a good place to start. Ensure validation of any\u00a0transaction or\u00a0any\u00a0access attempts.<\/p>\n<p>Now the next question arises, how?\u00a0There are solutions that ensure\u00a0compromises don\u2019t happen\u00a0on\u00a0the user level\u00a0or the device level. This solution could be a UEM, something in the lines of what<a href=\"https:\/\/www.hexnode.com\/uem\/solution\/mdm\/?utm_source=zero_trust_model&amp;utm_medium=referral&amp;utm_campaign=internal_link\">\u00a0Hexnode<\/a>\u00a0would offer.\u00a0So, if you are an organization looking to\u00a0maximize\u00a0ROI when it comes to\u00a0zero-trust cybersecurity, this is the way to go.<\/p>\n<div style=\"width: 960px;\" class=\"wp-video\"><video class=\"wp-video-shortcode\" id=\"video-6980-1\" width=\"960\" height=\"540\" preload=\"metadata\" controls=\"controls\"><source type=\"video\/mp4\" src=\"https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2020\/12\/HexCon20-Zero-Trust-Part-1.mp4?_=1\" \/><a href=\"https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2020\/12\/HexCon20-Zero-Trust-Part-1.mp4\">https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2020\/12\/HexCon20-Zero-Trust-Part-1.mp4<\/a><\/video><\/div>\n<h2>Is the zero-trust model foolproof?<\/h2>\n<p>The implementation of the\u00a0zero-trust model does not ensure 100% safety from\u00a0cyber-attacks.\u00a0Some of the biggest cyber-attacks in recent years happened\u00a0because the\u00a0company&#8217;s\u00a0systems\u00a0weren\u2019t segmented to a controllable level. With higher levels of\u00a0segmentation,\u00a0the company can limit the\u00a0radius of\u00a0attacks\u00a0by limiting the attacker\u2019s access inside\u00a0the system.<\/p>\n<p>A system that is 100% secure from\u00a0cyber-attacks\u00a0will be\u00a0unusable. The premise of Zero trust\u00a0is that you are willing to compromise certain\u00a0device features for\u00a0security,\u00a0the\u00a0quality of\u00a0security\u00a0depends\u00a0on what you are willing to give up. The advancement in technology\u00a0is opening up workarounds to ensure better security with lower compromises but as it stands,\u00a0companies should find the sweet spot where they don\u2019t have to give up the necessary device functionalities for security.<\/p>\n<h2>Zero-trust model for\u00a0everyone<\/h2>\n<p>The issue when it comes to SMBs is that they feel that they are too small for\u00a0a cyber-attack. In fact, according to a recent survey conducted by\u00a0BullGuard, 60% of SMBs have this similar mindset. This cannot fly in the present cyber environment. In his session, Dr. Cunningham said \u201cThey (SMBs) should be looking at the big enterprises and saying how can I leverage that same strategic approach to Zero Trust and make it specific for them. \u201c<\/p>\n<p>Approaching the problem of cybersecurity with the mindset of a big company is key when it comes to establishing a level playing field on the cyber security front. To be clear, we don\u2019t expect a small company with a few workers to establish a huge data bank or anything. The efforts made by the company should reflect the same kind of earnestness put forth by a company,\u00a0twice its size. In the end, the aim is to establish a field full of hard targets that cyber\u00a0attackers\u00a0would find difficult to crack.<\/p>\n<h2>But what about larger enterprises?<\/h2>\n<p>The bigger enterprises see the value of having a security strategy that can enable an outcome. They see a benefit in the\u00a0translation\u00a0that\u00a0occurs\u00a0between security objectives and capabilities and business objectives and capabilities\u00a0which result in\u00a0happier employees, higher revenue generation, and less time spent trying to\u00a0solve\u00a0security\u00a0concerns.<\/p>\n<p>The\u00a0plan isn&#8217;t\u00a0necessarily about adding more technology and\u00a0more security but about doing what makes sense to solve the physics of the problem.\u00a0The security plans when strategically aligned help resonates with the goals of the business.<\/p>\n<div style=\"width: 960px;\" class=\"wp-video\"><video class=\"wp-video-shortcode\" id=\"video-6980-2\" width=\"960\" height=\"540\" preload=\"metadata\" controls=\"controls\"><source type=\"video\/mp4\" src=\"https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2020\/12\/HexCon-Zero-Trust-Part-2.mp4?_=2\" \/><a href=\"https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2020\/12\/HexCon-Zero-Trust-Part-2.mp4\">https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2020\/12\/HexCon-Zero-Trust-Part-2.mp4<\/a><\/video><\/div>\n<h2>UEMs and the Zero-Trust model: How do they relate?<\/h2>\n<p>In an environment where the baseline is \u201ctrust nothing and verify everything,\u201d it is important that you stay up to date, especially regarding various aspects of a device, like updates and its various capabilities. The easiest way to ensure this happens in an automated manner is through a UEM solution. The zero-trust model and UEMs are self-fulfilling in the sense that, UEMs\u00a0manage\u00a0one of\u00a0the\u00a0basic\u00a0avenues of compromise when it comes to Zero trust,\u00a0the device.<\/p>\n<p>UEMs enable you to apply controls on this basic component of cybersecurity and is key when it comes to establishing a zero-trust model.<\/p>\n<p>The use of identity and access management services in conjunction with UEMs\u00a0is\u00a0considered as doubling down on the zero-trust security model.\u00a0\u00a0Passwords are one of the main areas where organizations get\u00a0compromised, users have over 90\u00a0online accounts\u00a0per device.\u00a0Ensuring\u00a0strict password policies, taking care of the device, making sure\u00a0it&#8217;s\u00a0patched,\u00a0restricting\u00a0user\u00a0privileges,\u00a0and\u00a0addressing\u00a0the core\u00a0requirements\u00a0for the\u00a0adversary\u00a0will help you increase your security.<\/p>\n<p>Anything more than what&#8217;s needed for the purpose of a user&#8217;s work will only hurt your company. Preventing users from being the entity that causes harm and keeping the systems relatively simple without affecting user experience will be well accepted and is the end state experts are trying to reach with zero-trust.<\/p>\n<h2>How long does it take for an organization to reach a zero-trust end state?<\/h2>\n<p>The\u00a0time taken for completing the adoption\u00a0of the zero-trust model depends on the size and type of\u00a0organization. Some\u00a0organizations\u00a0may already be on track\u00a0and can reach the end-state fairly quickly while\u00a0for\u00a0new ones\u00a0it\u00a0can take years.<\/p>\n<p>All cybersecurity revolves around data at some point and the zero-trust model helps users understand it. Users often tend to stop at compliance policies which are only a part of zero-trust and are far from the end-state of the model.<\/p>\n<p>The time required can be exponentially\u00a0decreased\u00a0by using vendor\u00a0solutions\u00a0like\u00a0Hexnode that allows users to reach a zero-trust end-state quickly and at scale with policy engines\u00a0that make the process controllable.\u00a0The constant\u00a0updating\u00a0and monitoring of the systems\u00a0will help you\u00a0get\u00a0to the end-state\u00a0faster, which may still take a while,\u00a0but you will certainly see the benefits along the way.<\/p>\n<h2>How do you know if a zero-trust model is successful?<\/h2>\n<p>Once you have established a zero-trust model in your organization, you obviously would be curious regarding the level of success that was brought forward by this model. Some of the key parameters that can be used to measure success when it comes to zero-trust is visibility and transparency. Compare the cybersecurity posture of your organization before and after deploying the zero-trust model in your organization.\u00a0 Are you able to view more devices? Can you pinpoint who is using what devices? Are the transactions that happen between devices transparent? As Dr. Cunningham said in\u00a0his session, \u201cI don\u2019t think in reality anyone will ever say that they are going to get a 100% real-time accountability on every asset. But when you move towards a more zero-trust state you would find yourself getting closer to that 100% mark.\u201d<\/p>\n<p>A successful Zero-trust implementation would also reflect an optimized budget when it comes to cybersecurity. As you inch closer to a zero-trust state, you would know what solution would solve what problem. Then\u00a0you\u00a0could easily get rid of other solutions or processes that weren\u2019t useful to you.<\/p>\n<h2>The relevance of zero trust in 2020<\/h2>\n<p>Since the first quarter of 2020, many\u00a0organizations\u00a0have been\u00a0forced to enact remote working\u00a0protocols. This meant that the perimeter no longer existed. The devices deployed by\u00a0organizations\u00a0were spread across a large area. And by the look of\u00a0things, it seems we are would be remote and mobile for a while at least. \u2028The optimal way to deal with the problem of cybersecurity at this juncture would be\u00a0to adopt a zero-trust model.\u00a0 Dr. Cunningham added,\u201d 84% of\u00a0organizations\u00a0that I\u2019ve talked to, in my data, are moving towards zero trust, this is because of the move that has taken place due to remote work. \u2028\u201d<\/p>\n<p>Most of us are going to be remote and most\u00a0of us\u00a0are going to be outside the perimeter. It is the ideal time to move towards a\u00a0zero-trust\u00a0approach.<\/p>\n<p>Dr. Cunningham wrapped up the session with a piece of advice for all the organizations looking to adopt the zero-trust model\u00a0\u201cBe compliant, get compliant, know what the value of your data\u00a0is\u00a0\u2026\u00a0but don\u2019t stop there\u00a0go further\u201d.<\/p>\n<div style=\"width: 960px;\" class=\"wp-video\"><video class=\"wp-video-shortcode\" id=\"video-6980-3\" width=\"960\" height=\"540\" preload=\"metadata\" controls=\"controls\"><source type=\"video\/mp4\" src=\"https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2020\/12\/HexCon20-Zero-Trust-Part-3.mp4?_=3\" \/><a href=\"https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2020\/12\/HexCon20-Zero-Trust-Part-3.mp4\">https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2020\/12\/HexCon20-Zero-Trust-Part-3.mp4<\/a><\/video><\/div>\n<p><b><div class=\"next_blog\"><div class=\"post-next\"><div class=\"hex_blog_box_parent\"><div class=\"blog_warp_next\"><div class=\"next_blog_thumb\" style=\"background-image:url(https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2020\/10\/Zero-Trust-and-Cybersecurity-with-Hexnode-UEM-cover-image.jpg?format=webp)\"><\/div><div class=\"next_post_content\"><div class=\"center_box\"><h4>Zero Trust and Cybersecurity with Hexnode MDM<\/h4><p>Never trust, always verify. Based on this principle, the Zero Trust model secures your organization from outsider and insider attacks alike.<\/p><\/div><\/div><\/div><a class=\"hex_blog_box_link hn-cta__blogs--blog-box\" href=\"https:\/\/www.hexnode.com\/blogs\/zero-trust-and-cybersecurity-with-hexnode-mdm\/?utm_source=zero_trust_model&utm_medium=referral&utm_campaign=blog_box\" aria-label=\"Zero Trust and Cybersecurity with Hexnode MDM\"><\/a><\/div><\/div><\/div><\/b><\/p>\n<p>Zero-trust is an evolving concept, the\u00a0developments in security with the\u00a0zero-trust\u00a0model\u00a0solves\u00a0all the security issues we had in the past but it doesn\u2019t end there,\u00a0the issues of the present and future can only be\u00a0addressed by constantly updating and securing your users and\u00a0endpoints.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The network firewall as we know was established somewhere in the \u201990s. System admins everywhere&#8230;<\/p>\n","protected":false},"author":19,"featured_media":7056,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[4783],"tags":[4786,4478],"class_list":["post-6980","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-events","tag-zero-trust","tag-hexcon","tab_group-inside-hexnode"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Is Zero Trust model the final frontier in enterprise security?<\/title>\n<meta name=\"description\" content=\"The increase in cyber attacks demands the implementation of the zero trust model, most enterprises are unaware of the benifits of the model and shy away.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.hexnode.com\/blogs\/is-zero-trust-model-the-final-frontier-in-enterprise-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Is Zero Trust model the final frontier in enterprise security?\" \/>\n<meta property=\"og:description\" content=\"The increase in cyber attacks demands the implementation of the zero trust model, most enterprises are unaware of the benifits of the model and shy away.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.hexnode.com\/blogs\/is-zero-trust-model-the-final-frontier-in-enterprise-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Hexnode Blogs\" \/>\n<meta property=\"article:published_time\" content=\"2020-12-10T10:42:20+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-07-05T06:26:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2020\/12\/Zero-Trust-session-for-enterprise-security.jpg?format=webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1340\" \/>\n\t<meta property=\"og:image:height\" content=\"720\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jayden Traor\u00e9\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jayden Traor\u00e9\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.hexnode.com\/blogs\/is-zero-trust-model-the-final-frontier-in-enterprise-security\/\",\"url\":\"https:\/\/www.hexnode.com\/blogs\/is-zero-trust-model-the-final-frontier-in-enterprise-security\/\",\"name\":\"Is Zero Trust model the final frontier in enterprise security?\",\"isPartOf\":{\"@id\":\"https:\/\/www.hexnode.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.hexnode.com\/blogs\/is-zero-trust-model-the-final-frontier-in-enterprise-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.hexnode.com\/blogs\/is-zero-trust-model-the-final-frontier-in-enterprise-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2020\/12\/Zero-Trust-session-for-enterprise-security.jpg?format=webp\",\"datePublished\":\"2020-12-10T10:42:20+00:00\",\"dateModified\":\"2022-07-05T06:26:30+00:00\",\"author\":{\"@id\":\"https:\/\/www.hexnode.com\/blogs\/#\/schema\/person\/6179ac53991edf4d79c5890daa2b6f6d\"},\"description\":\"The increase in cyber attacks demands the implementation of the zero trust model, most enterprises are unaware of the benifits of the model and shy away.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.hexnode.com\/blogs\/is-zero-trust-model-the-final-frontier-in-enterprise-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.hexnode.com\/blogs\/is-zero-trust-model-the-final-frontier-in-enterprise-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.hexnode.com\/blogs\/is-zero-trust-model-the-final-frontier-in-enterprise-security\/#primaryimage\",\"url\":\"https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2020\/12\/Zero-Trust-session-for-enterprise-security.jpg?format=webp\",\"contentUrl\":\"https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2020\/12\/Zero-Trust-session-for-enterprise-security.jpg?format=webp\",\"width\":1340,\"height\":720,\"caption\":\"Zero Trust session for enterprise security\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.hexnode.com\/blogs\/is-zero-trust-model-the-final-frontier-in-enterprise-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.hexnode.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Is Zero Trust model the final frontier in enterprise security?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.hexnode.com\/blogs\/#website\",\"url\":\"https:\/\/www.hexnode.com\/blogs\/\",\"name\":\"Hexnode Blogs\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.hexnode.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.hexnode.com\/blogs\/#\/schema\/person\/6179ac53991edf4d79c5890daa2b6f6d\",\"name\":\"Jayden Traor\u00e9\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.hexnode.com\/blogs\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/61e916589c3069f86078e5fab9854b36632b7b3042afc89b0a61eb3bd7ad8334?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/61e916589c3069f86078e5fab9854b36632b7b3042afc89b0a61eb3bd7ad8334?s=96&d=mm&r=g\",\"caption\":\"Jayden Traor\u00e9\"},\"description\":\"Product Evangelist @ Hexnode. Sometimes, I have the feeling I live in a story: a magnificent story written by a mediocre writer living off coffee and technology.\",\"url\":\"https:\/\/www.hexnode.com\/blogs\/author\/melvin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Is Zero Trust model the final frontier in enterprise security?","description":"The increase in cyber attacks demands the implementation of the zero trust model, most enterprises are unaware of the benifits of the model and shy away.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.hexnode.com\/blogs\/is-zero-trust-model-the-final-frontier-in-enterprise-security\/","og_locale":"en_US","og_type":"article","og_title":"Is Zero Trust model the final frontier in enterprise security?","og_description":"The increase in cyber attacks demands the implementation of the zero trust model, most enterprises are unaware of the benifits of the model and shy away.","og_url":"https:\/\/www.hexnode.com\/blogs\/is-zero-trust-model-the-final-frontier-in-enterprise-security\/","og_site_name":"Hexnode Blogs","article_published_time":"2020-12-10T10:42:20+00:00","article_modified_time":"2022-07-05T06:26:30+00:00","og_image":[{"width":1340,"height":720,"url":"https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2020\/12\/Zero-Trust-session-for-enterprise-security.jpg?format=webp","type":"image\/jpeg"}],"author":"Jayden Traor\u00e9","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Jayden Traor\u00e9","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.hexnode.com\/blogs\/is-zero-trust-model-the-final-frontier-in-enterprise-security\/","url":"https:\/\/www.hexnode.com\/blogs\/is-zero-trust-model-the-final-frontier-in-enterprise-security\/","name":"Is Zero Trust model the final frontier in enterprise security?","isPartOf":{"@id":"https:\/\/www.hexnode.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.hexnode.com\/blogs\/is-zero-trust-model-the-final-frontier-in-enterprise-security\/#primaryimage"},"image":{"@id":"https:\/\/www.hexnode.com\/blogs\/is-zero-trust-model-the-final-frontier-in-enterprise-security\/#primaryimage"},"thumbnailUrl":"https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2020\/12\/Zero-Trust-session-for-enterprise-security.jpg?format=webp","datePublished":"2020-12-10T10:42:20+00:00","dateModified":"2022-07-05T06:26:30+00:00","author":{"@id":"https:\/\/www.hexnode.com\/blogs\/#\/schema\/person\/6179ac53991edf4d79c5890daa2b6f6d"},"description":"The increase in cyber attacks demands the implementation of the zero trust model, most enterprises are unaware of the benifits of the model and shy away.","breadcrumb":{"@id":"https:\/\/www.hexnode.com\/blogs\/is-zero-trust-model-the-final-frontier-in-enterprise-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.hexnode.com\/blogs\/is-zero-trust-model-the-final-frontier-in-enterprise-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.hexnode.com\/blogs\/is-zero-trust-model-the-final-frontier-in-enterprise-security\/#primaryimage","url":"https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2020\/12\/Zero-Trust-session-for-enterprise-security.jpg?format=webp","contentUrl":"https:\/\/cdn.hexnode.com\/blogs\/wp-content\/uploads\/2020\/12\/Zero-Trust-session-for-enterprise-security.jpg?format=webp","width":1340,"height":720,"caption":"Zero Trust session for enterprise security"},{"@type":"BreadcrumbList","@id":"https:\/\/www.hexnode.com\/blogs\/is-zero-trust-model-the-final-frontier-in-enterprise-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.hexnode.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Is Zero Trust model the final frontier in enterprise security?"}]},{"@type":"WebSite","@id":"https:\/\/www.hexnode.com\/blogs\/#website","url":"https:\/\/www.hexnode.com\/blogs\/","name":"Hexnode Blogs","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.hexnode.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.hexnode.com\/blogs\/#\/schema\/person\/6179ac53991edf4d79c5890daa2b6f6d","name":"Jayden Traor\u00e9","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.hexnode.com\/blogs\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/61e916589c3069f86078e5fab9854b36632b7b3042afc89b0a61eb3bd7ad8334?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/61e916589c3069f86078e5fab9854b36632b7b3042afc89b0a61eb3bd7ad8334?s=96&d=mm&r=g","caption":"Jayden Traor\u00e9"},"description":"Product Evangelist @ Hexnode. Sometimes, I have the feeling I live in a story: a magnificent story written by a mediocre writer living off coffee and technology.","url":"https:\/\/www.hexnode.com\/blogs\/author\/melvin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.hexnode.com\/blogs\/wp-json\/wp\/v2\/posts\/6980","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.hexnode.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.hexnode.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.hexnode.com\/blogs\/wp-json\/wp\/v2\/users\/19"}],"replies":[{"embeddable":true,"href":"https:\/\/www.hexnode.com\/blogs\/wp-json\/wp\/v2\/comments?post=6980"}],"version-history":[{"count":8,"href":"https:\/\/www.hexnode.com\/blogs\/wp-json\/wp\/v2\/posts\/6980\/revisions"}],"predecessor-version":[{"id":19654,"href":"https:\/\/www.hexnode.com\/blogs\/wp-json\/wp\/v2\/posts\/6980\/revisions\/19654"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.hexnode.com\/blogs\/wp-json\/wp\/v2\/media\/7056"}],"wp:attachment":[{"href":"https:\/\/www.hexnode.com\/blogs\/wp-json\/wp\/v2\/media?parent=6980"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.hexnode.com\/blogs\/wp-json\/wp\/v2\/categories?post=6980"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.hexnode.com\/blogs\/wp-json\/wp\/v2\/tags?post=6980"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}