{"id":99459,"date":"2019-06-10T06:00:34","date_gmt":"2019-06-10T13:00:34","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=99459"},"modified":"2019-06-07T10:59:50","modified_gmt":"2019-06-07T17:59:50","slug":"network-zero-trust-debunking-misperceptions","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2019\/06\/network-zero-trust-debunking-misperceptions\/","title":{"rendered":"Zero Trust: Debunking Misperceptions"},"content":{"rendered":"<p>As organizations explore Zero Trust as a means to prevent successful cyberattacks, more vendors are using Zero Trust as a cybersecurity buzzword. If you walked through the halls of RSA this year, you will have noticed this to be true. Zero Trust was a part of dozens upon dozens of vendor booths, presentations, pamphlets, etc. in one fashion or another. This has resulted in misperceptions of what Zero Trust really is.<\/p>\n<p>With the recent availability of \u201cZero Trust products,\u201d the perception is that Zero Trust is all about identity or the belief that you have to rip and replace everything to achieve it. With so much noise and confusion, it\u2019s no surprise that people believe that it\u2019s a complex, costly and time-consuming initiative.<\/p>\n<p>In truth, much of the complexity comes from the technology used to implement Zero Trust. John Kindervag, creator of Zero Trust and field CTA at Palo Alto Networks, explained <a href=\"https:\/\/www.paloaltonetworks.com\/resources\/webcasts\/debunking-the-myth-around-implementing-zero-trust\">in a recent webinar<\/a>, \u201cThere are no Zero Trust products. There are products that work really well in Zero Trust environments, and there are products that don\u2019t.\u201d<\/p>\n<p>When trying to implement Zero Trust, you don\u2019t have to do everything right out the gate. It\u2019s an iterative process that should start small and expand overtime as you gain familiarity and visibility into what is most critical to secure.<\/p>\n<p>To better understand how to implement Zero Trust, there is a five-step methodology that simplifies the deployment of Zero Trust and, when followed, makes Zero Trust more than a buzzword, more like an achievable strategy that protects your most critical assets.<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/06\/ZT.png\"><div style=\"max-width:100%\" data-width=\"974\"><span class=\"ar-custom\" style=\"padding-bottom:49.79%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"alignnone wp-image-99473 size-full lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/06\/ZT.png\" alt=\"\" width=\"974\" height=\"485\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/06\/ZT.png 974w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/06\/ZT-230x115.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/06\/ZT-768x382.png 768w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/06\/ZT-500x249.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/06\/ZT-510x254.png 510w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/06\/ZT-80x40.png 80w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/06\/ZT-602x300.png 602w\" sizes=\"auto, (max-width: 974px) 100vw, 974px\" \/><\/span><\/div><\/a><\/p>\n<p>You can learn more about the five steps by reading the white paper, \u201c<a href=\"https:\/\/start.paloaltonetworks.com\/5-steps-to-zero-trust.html\">Simplify Zero Trust Implementation Using a Five-Step Methodology<\/a>.\u201d<\/p>\n","protected":false},"excerpt":{"rendered":"<p>As organizations explore Zero Trust as a means to prevent successful cyberattacks, more vendors are using Zero Trust as a cybersecurity buzzword. <\/p>\n","protected":false},"author":226,"featured_media":97767,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[6765],"tags":[810,73],"coauthors":[2416],"class_list":["post-99459","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-secure-the-enterprise","tag-network-security","tag-zero-trust","net_sec_category-zero-trust-security"],"jetpack_featured_media_url":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/03\/corp-blog-network-600x300.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/99459","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/226"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=99459"}],"version-history":[{"count":4,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/99459\/revisions"}],"predecessor-version":[{"id":99489,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/99459\/revisions\/99489"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/97767"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=99459"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=99459"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=99459"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=99459"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}