Zero trust is very broad, but all products fall into one of three basic architectures.

All zero trust solutions fall into one of three main access architectures:

  1. User-to-Resource (including ZTNA products)
  2. Device-to-Device (including network microsegmentation products)
  3. Service-to-Service (including workload and datacenter microsegmentation)

This short video explains the basic zero trust language and these three product architectures.

jj

Author, speaker, and recognized authority on network and wireless security architectures, Jennifer (JJ) Minella helps organizations solve technical problems and align teams.

View all posts

1 comment

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.