{"id":2679,"date":"2012-07-18T08:51:35","date_gmt":"2012-07-18T15:51:35","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=2679"},"modified":"2012-07-18T08:51:35","modified_gmt":"2012-07-18T15:51:35","slug":"zero-trust-solution-brief","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2012\/07\/zero-trust-solution-brief\/","title":{"rendered":"Zero Trust Solution Brief"},"content":{"rendered":"<p>During the recent Data Center summit,\u00a0two of\u00a0the most common questions were how to get more information on the Forrester Research Zero Trust architecture and how to implement a Zero Trust network architecture with Palo Alto Networks next-generation firewalls.<\/p>\n<p>For those of you who have not heard of the Zero Trust network architecture, it is a new security framework advocated by Forrester Principal Analyst <a href=\"http:\/\/blogs.forrester.com\/john_kindervag\" rel=\"nofollow,noopener\" >John Kindervag <\/a>placing security at the core of the network and building all other network elements around it. This security-centric approach advocates a number of principles to design a secure and flexible network:<\/p>\n<ol>\n<li>Ensure that all resources are accessed securely regardless of location<\/li>\n<li>Adopt a least-privilege strategy and strictly enforce access control<\/li>\n<li>Inspect and log all traffic<\/li>\n<\/ol>\n<p><!--more--><\/p>\n<p>The heart of the architecture is a network segmentation gateway that provides high-performance capabilities to inspect all traffic, enforce access control and protect against all threats. It incorporates security functions like firewalling, IPS, VPN gateway and more\u2026If this network segmentation gateway sounds a lot like a next-generation firewall, it\u2019s because it is. Only a next-generation firewall can deliver all these security functions without impacting performance.<\/p>\n<p>We're\u00a0pleased to provide a <strong>Zero Trust Solution Brief<\/strong> that walks through how the Palo Alto Networks next-generation firewalls can serve as the Zero Trust network segmentation gateway. In collaboration with Forrester Research, for a short period of time, the Zero Trust research reports by John Kindervag that describe this architecture in detail are also available to you!<\/p>\n<p>The Palo Alto Networks Zero Trust Solution Brief and Kindervag\u2019s research reports are all available for download <strong><a href=\"http:\/\/connect.paloaltonetworks.com\/zero-trust\">here<\/a>.<\/strong> Happy reading!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>During the recent Data Center summit,\u00a0two of\u00a0the most common questions were how to get more information on the Forrester Research Zero Trust architecture and how to implement a Zero Trust network architecture &hellip;<\/p>\n","protected":false},"author":40,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[75,1],"tags":[59,31,12,72,29,73],"coauthors":[771],"class_list":["post-2679","post","type-post","status-publish","format-standard","hentry","category-data-center-2","category-uncategorized","tag-app-id","tag-application-control","tag-data-center","tag-data-center-summit","tag-threat-prevention","tag-zero-trust"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/2679","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=2679"}],"version-history":[{"count":14,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/2679\/revisions"}],"predecessor-version":[{"id":2693,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/2679\/revisions\/2693"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=2679"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=2679"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=2679"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=2679"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}