« Back to Glossary Index

A zero-trust network assumes every user—internal or external—could be a threat. Therefore, every request for network resources must be from an authenticated, authorized, and validated users. It centers on the never trust, always verify philosophy. The zero-trust security model has become the dominant standard for protecting digital assets. (Often referred to as Zero Trust Network Access or ZTNA)

« Back to Glossary Index