Download Now

First Name
Last Name
Postal Code - optional
Thank you!
Error - something went wrong!

Implementing the Core Elements of a Zero Trust Architecture

November 10, 2020

U.S. Federal Government agencies are adopting cloud-based applications and services to accelerate the pace of innovation, simplify operations, and improve mobility. Malicious insiders or external attackers can breach the perimeter, gain access to the trusted enterprise network, and move laterally to steal data or wreak havoc.

National Institute of Standards and Technology (NIST) Special Publication (SP) 800-207 defines a new zero trust architecture (ZTA) for the digital era. CyberArk identity security solutions are based on the principle of Zero Trust and can be used in a variety of SP 800 207 deployment scenarios. Government agencies and private-sector enterprises can implement various CyberArk solutions as ZTA core logical components to help satisfy the key tenets of Zero Trust laid out in the NIST publication.

Previous Video
Bridging the Cyber Divide: Episode 1 - Securing a digital economy
Bridging the Cyber Divide: Episode 1 - Securing a digital economy

Robert Deakin - Director of Cyber Security, ACCC (Australian Competition and Consumer Commission) & CyberAr...

Next Flipbook
Early Learning Coalition
Early Learning Coalition

Learn how ECL leveraged CyberArk Idaptive to simplify access management to critical apps, enhance security ...