![]() Over the course of a decade, BeyondCorp evolved into a complete, secure access control system. By redefining the perimeter from the network to individual users, the company eliminated its traditional VPN-based approach to remote access. “BeyondCorp” is the umbrella term Google applied to its Zero Trust network architecture. Fortunately, although BeyondCorp was the first Zero Trust implementation and was built for Google’s scale, organizations have options that are easier to deploy and maintain. ![]() In this article, we will review why Google launched the BeyondCorp initiative, how its access control system works, and what limitations organizations considering BeyondCorp should take into account. In the years since, Google inspired a new consensus within the security community that Zero Trust is the new model for enterprise network security that organizations should strive for as a way to mitigate the risks and shortcomings of the traditional fixed perimeter security model. ![]() The BeyondCorp initiative was the first time a large enterprise had implemented modern Zero Trust concepts at scale. In 2014, Google revealed that it had begun a dramatic change in the way it secured and controlled access to its enterprise resources.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |