network-authentication

Zero trust network

The zero trust network model is based on the assumption that no device connected to the network is trusted, this includes corporate devices that are fully compliant with IT policies and are in use by an authorised corporate IT user. The zero trust model goes further than traditional network authentication models where devices are trusted after authenticating to the network. In the zero trust model devices are further restricted within the network using a least privilege concept thereby only allowing access to required resources.

The zero trust model is acheived using a combination of traditional network authentication (802.1x), micro-segmentation, network access controls and central authorisation services. Implementing a zero trust network model can be challenging with many difficult design decisions required.

NGTS can provide expert consultancy to assist in the design and implementation of a zero trust network model.

Scroll to Top