Zero Trust Security
eBook - ePub

Zero Trust Security

A complete guide

  1. English
  2. ePUB (mobile friendly)
  3. Available on iOS & Android
eBook - ePub

Zero Trust Security

A complete guide

Book details
Table of contents
Citations

About This Book

Guide to provide on implementing Zero Trust based security controls

Key Features
? Includes Zero Trust, security, operational advantages, Zero Trust security architectures
? Extensive coverage on dynamic, identity-centric, IAM systems, IDS/IPS, SIEM, CISOs,
? Learn to design a credible and defensible Zero Trust security architecture

Description
This book delves into the complexities of business settings. It covers the practical guidelines and requirements your security team will need to design and execute a zero-trust journey while maximizing the value of your current enterprise security architecture. The goal of Zero Trust is to radically alter the underlying concept and approach to enterprise security, moving away from old and clearly unsuccessful perimeter-centric techniques and toward a dynamic, identity-centric, and policy-based approach. This book helps the readers to earn about IPS, IDS, and IDPS, along with their varieties and comparing them. It also covers Virtual Private Networks, types of VPNs.and also to understand how zero trust and VPN work together By the completion of the book, you will be able to build a credible and defensible Zero Trust security architecture for your business, as well as implement a step-by-step process that will result in considerably better security and streamlined operations.

What you will learn
? Understand the importance of implementing Zero Trust security concepts.
? Take a look at the security and operational advantages of Zero Trust.
? Make educated judgments on where, when, and how Zero Trust security architectures should be used.
? Learn how the path to Zero Trust will affect your business and security architecture.
? Prepare to map out your path to Zero Trust while finding initiatives that can provide immediate security advantages to your company.

Who this book is for
This book is meant for the CISOs, enterprise security architects, security engineers, network security architects, solution architects, Zero Trust strategists, and among the security leaders, architects, and practitioners.

Table of Contents
1. Introduction to Enterprise Security
2. Get to Know Zero Trust
3. Architectures With Zero Trust
4. Zero Trust in Practice
5. Identity and Access Management (IAM)
6. Network Infrastructure
7. Network Access Control
8. Intrusion Detection and Prevention Systems
9. Virtual Private Networks
10. Next-Generation Firewalls
11. Security Operations
12. Privileged Access Management (PAM)
13. Data Protection
14. Infrastructure and Platform as a Service
15.Software as a Service (SaaS)
16. IoT Devices
17. A Policy of Zero Trust
18. Zero Trust Scenarios
19. Creating a Successful Zero Trust Environment

Frequently asked questions

Simply head over to the account section in settings and click on “Cancel Subscription” - it’s as simple as that. After you cancel, your membership will stay active for the remainder of the time you’ve paid for. Learn more here.
At the moment all of our mobile-responsive ePub books are available to download via the app. Most of our PDFs are also available to download and we're working on making the final remaining ones downloadable now. Learn more here.
Both plans give you full access to the library and all of Perlego’s features. The only differences are the price and subscription period: With the annual plan you’ll save around 30% compared to 12 months on the monthly plan.
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, we’ve got you covered! Learn more here.
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Yes, you can access Zero Trust Security by Nike Andravous in PDF and/or ePUB format, as well as other popular books in Computer Science & Computer Networking. We have over one million books available in our catalogue for you to explore.

Information

Year
2022
ISBN
9789355512512

Table of contents

  1. Cover Page
  2. Title Page
  3. Copyright Page
  4. Dedication Page
  5. About the Author
  6. About the Reviewer
  7. Acknowledgments
  8. Preface
  9. Errata
  10. Table of Contents
  11. 1. Introduction to Enterprise Security
  12. 2. Get to Know Zero Trust
  13. 3. Architectures With Zero Trust
  14. 4. Zero Trust in Practice
  15. 5. Identity and Access Management (IAM)
  16. 6. Network Infrastructure
  17. 7. Network Access Control
  18. 8. Intrusion Detection and Prevention Systems
  19. 9. Virtual Private Networks
  20. 10. Next-Generation Firewalls
  21. 11. Security Operations
  22. 12. Privileged Access Management (PAM)
  23. 13. Data Protection
  24. 14. Infrastructure and Platform as a Service
  25. 15. Software as a Service (SaaS)
  26. 16. IoT Devices
  27. 17. A Policy of Zero Trust
  28. 18. Zero Trust Scenarios
  29. 19. Creating a Successful Zero Trust Environment