Search
Close this search box.

Blog

Zero Trust and SASE

What do Pink Floyd and SASE Zero Trust have in common? Keep reading to learn more.
November 15, 2021

Zero Trust and SASE

Wisdom can come from unusual sources, even the lyrics of classic rock bands from my youth. The band Pink Floyd, in their song "Dogs" from the 1977 album "Animals," noted, "You have to be trusted by the people that you lie to so that when they turn their backs on you, you'll get the chance to put the knife in."

This lyric reminds us of something important about trust: it creates vulnerability. We let our guard down at our peril. This simple truth is the foundation of a network security philosophy known as Zero Trust.

Assume the Worst

Despite the name, Zero Trust doesn't mean nothing is trusted under any circumstances. It means trust is not implicitly granted and never more than necessary for a particular user or device to accomplish its function. It is a suspicious posture, assuming all networks are untrustworthy, potentially even hostile, including those running on company infrastructure inside branch offices.

It requires users and devices to be explicitly authenticated, where possible using multi-factor authentication. And it dynamically assesses "trustworthiness," so user actions that might be permissible from a company-managed laptop plugged into a company-managed Ethernet switch might be disallowed when attempted from an unmanaged device over a public WIFI network at a coffee shop or airport.

By assuming the worst, Zero Trust architecture minimizes the risk of compromise and limits the potential harm a compromise might cause.

Zero Trust and SASE

The fact that Zero Trust is an essential ingredient in the Secure Access Service Edge (SASE) framework should come as no surprise. SASE is tailored to the modern enterprise, where more users may be remote than in offices and more applications and data may be in the cloud than in the data center.

SASE provides security in a world where the Internet is the WAN and traditional notions of security perimeters are obsolete. It is a world in which the suspicions of Zero Trust are manifestly justified. SASE without Zero Trust would be a recipe for disaster. Trust me.

About GTT

GTT connects people across organizations, around the world, and to every application in the cloud. Our clients benefit from an outstanding service experience built on our core values of simplicity, speed, and agility. GTT owns and operates a global Tier 1 internet network and provides a comprehensive suite of cloud networking services. We also offer a complementary portfolio of managed services, including managed SD-WAN from leading technology vendors.

 

Related RESOURCES

Uncategorized

What is Network and Security as a Service (NSaaS) and How Does it Benefit Your Enterprise?

As the cybersecurity landscape evolves rapidly, businesses face a dual challenge: managing increasingly complex networks while safeguarding against emerging threats. Networking and Security as a ...
Uncategorized

Why Managed Services Make Sense for a SASE Framework

The co-managed option helps companies solve their challenges, while upskilling internal teams and improving performance. GTT's latest research-based white paper, Trends and Solutions for a ...
Blog

The Big Takeaway: 97% Say Cybersecurity & Network Integration is the Logical Next Step

When it comes to SD-WAN and SSE, as well as cybersecurity and networking teams, integration provides a range of benefits across the enterprise. GTT's latest ...
Blog

5 Common Ways Cybercriminals Spread Malware (and How To Outsmart Them)

There are currently around 1.2 billion malicious programs and potentially unwanted applications in existence, with threat actors deploying an average of 200,454 unique malware scripts ...
How is ESG part of working at GTT?
Blog

How is ESG part of working at GTT?

At GTT, we are passionate about supporting people – and it is that passion that drives our commitment to enhancing and growing our environmental, social ...
The Power of Training, Mentoring and Learning at GTT
Blog

Unlocking My Full Potential: The Power of Training, Mentoring and Learning at GTT

In a world where the pursuit of personal and professional excellence is a constant endeavor, I'm proud to work at GTT. Its mentoring and learning ...
DDoS attacks
Blog

DDoS Attacks in the First Half of 2024

Recent DDoS attacks including the Port of Seattle and Microsoft are showing that Cybercriminals are becoming more bold and attacking organizations regardless of size or ...
Young female engineer concept. GUI (Graphical User Interface).
Blog

How to Choose The Right SD-WAN Managed Service Provider for Your Business

Many factors can influence an enterprise's decision regarding which MSP to work with for SD-WAN, SSE and a SASE framework. But most agree on which ...
Blog

Heightened DDoS Activity: A Growing Concern in 2024

In January and February of 2024, GTT’s Security Operations Center along with Corero’s Advanced Research Team have jointly recorded a significant surge in distributed denial-of-service ...

OUR GARTNER RATING

Gartner Peer Insights logo
4.2

62 Reviews

88%
as of the last 12 months

Talk to an Expert

Interested in learning more about GTT products & services? Please complete this short form to schedule a call with one of our sales consultants.

Thank you for your information. One of our sales consultants will be in touch with you.

Scroll to Top