Episode 14.

Under lock and key. The principles of zero-trust

Episode Overview

With legacy network solutions based on VPN, authenticated users used to gain access to everything on the same subnet. Only a password prevented unauthorized users from accessing a resource. Zero trust flipped that paradigm by allowing users to only “see” the specific applications and resources explicitly permitted by their company’s security policy. Where did zero trust come from and why should you care?

Today’s guest is Bill Carter, Cato Networks’ sales engineer. We’ll talk about the principles of zero-trust, verification processes and how does a proper ZTNA architecture should look like.

Meet the host

Robin Johns

Knowledge and Training Director
at Cato Networks

A life long Educator and Enabler, Robin Johns, Cato’s Knowledge and Training Director, has a passion for all things tech. Robin has previously worked in the fields of WAN Optimization, Network Monitoring, Capacity Analysis, Digital Experience Management and Protocol Simulation. From Packets and Flows to things nobody knows. Robin wants to learn about it all.