×

Download Now

First Name
Last Name
Company
Country
State
Postal Code - optional
Thank you!
Error - something went wrong!
   

Implementing the Core Elements of a Zero Trust Architecture

November 10, 2020

U.S. Federal Government agencies are adopting cloud-based applications and services to accelerate the pace of innovation, simplify operations, and improve mobility. Malicious insiders or external attackers can breach the perimeter, gain access to the trusted enterprise network, and move laterally to steal data or wreak havoc.

National Institute of Standards and Technology (NIST) Special Publication (SP) 800-207 defines a new zero trust architecture (ZTA) for the digital era. CyberArk identity security solutions are based on the principle of Zero Trust and can be used in a variety of SP 800 207 deployment scenarios. Government agencies and private-sector enterprises can implement various CyberArk solutions as ZTA core logical components to help satisfy the key tenets of Zero Trust laid out in the NIST publication.

Previous Article
Securing Privileged Access and Identities in 5 Key Cloud Scenarios
Securing Privileged Access and Identities in 5 Key Cloud Scenarios

Best practices to enforce and maintain consistent, enterprise-wide PAM policies are vital. Included are 5 s...

Next Article
Intel, Please Stop Assisting Me
Intel, Please Stop Assisting Me

This post focuses on two vulnerabilities the CyberArk Labs team uncovered in the Intel Support Assistant th...