Full description not available
G**R
No Trust
This book really re-shaped my way of thinking about network security, breaking down concept by concept (with little focus on implementation details, which makes it more widely relevant to me) it goes through the main points to change the network architecture into a Beyond Corp (Google) like pattern. I learned a lot, and now I know what to go after as far as the actual implementation details, tools and frameworks for my company.
S**R
deFacto Reference Guide for Understanding and Building a Zero Trust Network
This book is perhaps the first complete commercial publication on this topic. It describes and characterizes the ZTN without prescribing a specific technology implementation. This book is a must-read for understanding the basis of an implementation and for balancing the claims of a vendor. At 216 pages it is packed with information; it might take a while to absorb fully the rich content. For me, it is best to absorb it in small chunks over an extended period of time.Of the 10 chapters, a particularly juicy one is chapter 8 "Trusting the Traffic" that explains networking fundamentals along with a detailed analysis of encryption; notably TLS and IPSEC. Chapter 6 "Trusting Users" conveys some heavy details of Identification and Authentication along with an emphasis on the need to create trusted hardware.For a person who participates in securing computer networks or has a desire to understand network security protocols in details, this book is a great read. For the fullest effect it is not a quick read but it has much to teach.
C**Y
Very Through Overview if Zero Trust Networks
This book starts with defining what Zero Trust Networks are and uses very familiar terminology to help readers understand that they actually are attainable with the technology that you may already have in your data center albeit with changes to thought and practice which may sometimes be harder that the technical challenges. There was a huge focus on networks but I guess that is too be expected. I would love more information about the best software architectures for applications that must run within a Zero Trust Network. How does this network based shift in security affect well known design patterns?
N**N
Fantastic technical overview
I remember first hearing about Zero Trust and it sounded like a nebulous model that required a high-end firewall to sit at the center of it all, keeping an eye on traffic. This book rebukes that and give practical, common sense examples of how to create it. The authors even suggest a slow rollout...more proof of the practicality of this book.
S**N
A must read for anyone interested in ZTN
I read this book few months back. Its long overdue. I was at RSAC 2019 and bunch of vendors talk about ZTN. Before you start to buy / deploy any product in the name of ZTN, please read this book. This book does not talk about one specific product but rather describes all the integrations and risk . Its a must read for everyone at any level.
G**G
Great book on emerging information security implementation model
Zero Trust is emerging as the next model to adapt and secure the models of today's operating environment (e.g., Cloud and internal). This book provides a great overview of the topic. I think more work on diagrams if another version is done, but they are adequate for the discussion in current level of discussion.
T**I
Great read for the old veteran and the novice.
Zero Trust is just another architecture and this book is a must read if you are going to join this conversation no matter if you are for or against. Great work
R**R
Not too bad a book.
It has the very high levels details for Zero Trust networks but few practical applications.
S**L
A must read for proactive network defences
This book balances extremely technical content, with easy to understand explanations and visual representations to explain the concept of creating secure silos, within corporate networks.If you are seeking to make life more difficult for today's cyber criminals, to move laterally through your corporate network, I would recommend that you add this to your reference library.
D**N
Facinating
Really interesting book - I'm a Solution Architect and certainly found it beneficial for my role.
M**.
Good primer to zero trust networks
Very thin paper used for book, and it is a slim volume, but concepts well explained.
J**A
Ottimo
In ottimo stato, come da descrizione.
P**N
Compelling content for cyber security professionals
Access being a new threat plane, it is worth exploring ZTS and this book is a very good starting point.
Trustpilot
1 month ago
2 weeks ago