August 2023

Why Zero Trust Architecture Now?

Strict Identity Verification for Everyone and Everything

Zero Trust is a holistic approach to network security that incorporates several different principles and technologies.

Traditional IT network security trusts anyone and anything inside the network. The problem with this approach is that once an attacker gains access to the network, they have free rein over everything inside.

A Zero Trust architecture trusts no one and nothing. Zero Trust Network Access (ZTNA) is the technology that makes it possible to implement a Zero Trust security model.

Here is our monthly curated list of thought-provoking articles, videos, and blog posts around zero trust architecture.


Zero Trust Security – What Is a Zero Trust Network?

By Cloudfare

The philosophy behind a Zero Trust network assumes that there are attackers both within and outside of the network, so neither users nor machines should be automatically trusted.

Zero Trust verifies user identity and privileges as well as device identity and security. Logins and connections time out periodically once established, forcing users and devices to be continuously re-verified.


Video – Zero Trust Explained in 4 Minutes

By IBM Technology

In this short 4-minute video you will learn that Zero trust is a security strategy that says that you should not grant implicit trust to a user, device, or application based solely upon some property about them such as their network location.

The video also shows that Zero trust is not something that can be delivered by implementing a new piece of technology, nor it is a point product or service that you can just go out and buy.  It is a security strategy.



Zero Trust Architecture

By Cindy Green-Ortiz

This book covers how today’s organizations need a new security model that more effectively adapts to the complexity and risks of modern environments, embraces hybrid workplaces, and protects people, devices, apps, and data wherever they’re located.

Zero Trust is the first model with the potential to do all of this. Zero Trust Architecture: Theory, Implementation, Maintenance, and Growth is the first comprehensive guide for architects, engineers, and other technical professionals who want to move from Zero Trust theory to implementation and successful ongoing operation.



What Is a Zero Trust Architecture

By Palo Alto Networks

Zero Trust is a strategic approach rooted in the principle of “never trust, always verify.”

Zero Trust is designed to protect modern environments and enable digital transformation by using strong authentication methods, leveraging network segmentation, preventing lateral movement, providing Layer 7 threat prevention, and simplifying granular, “least access” policies.

MangoChango’s ability to deliver unquestionable value to its clients is highly dependent on keeping abreast of new technologies and trends. Our clients value this commitment to leading-edge thinking and expertise.

MangoChango’s engineers are experts in a wide variety of technologies, frameworks, tools, and languages, with an emphasis on continuous learning as new thinking, tools, and techniques come to market.

Check here for more information and to explore our technology assessment and maturity framework.

Meet The Team

Talent Inside MangoChango

View this email in your browser