Credential theft, lateral movement and other cyber-attack tricks have foiled perimeter security again and again. We know that the old philosophy of trusting everything and everyone inside a network is no longer sound. The zero trust model — trust nothing, verify everything — is the proposed answer to this problem. But it’s easier said than done in real enterprise.
In this GigaBITE Ollie will discuss how Gigamon can support the ZTN through providing Visibility.