Zero trust architecture:
Today's organizations need a new security model that more effectively adapts to the complexity and risks of modern environments, embraces hybrid workplaces, and protects people, devices, apps, and data wherever they're located. Zero Trust is the first model with the potential to do all tha...
Gespeichert in:
Hauptverfasser: | , , , , , , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
San Jose, CA
Cisco Press
[2024]
|
Schlagworte: | |
Zusammenfassung: | Today's organizations need a new security model that more effectively adapts to the complexity and risks of modern environments, embraces hybrid workplaces, and protects people, devices, apps, and data wherever they're located. Zero Trust is the first model with the potential to do all that. Zero Trust Architecture: Theory, Implementation, Maintenance, and Growth is the first comprehensive guide for architects, engineers, and other technical professionals who want to move from Zero Trust theory to implementation and successful ongoing operation. A team of Cisco's leading experts and implementers offer the most comprehensive and substantive guide to Zero Trust, bringing clarity, vision, practical definitions, and real-world expertise to a space that's been overwhelmed with hype. The authors explain why Zero Trust identity-based models can enable greater flexibility, simpler operations, intuitive context in the implementation and management of least privilege security. Then, building on Cisco's own model, they systematically illuminate methodologies, supporting technologies, and integrations required on the journey to any Zero Trust identity-based model. Through real world experiences and case study examples, you'll learn what questions to ask, how to start planning, what exists today, what solution components still must emerge and evolve, and how to drive value in the short-term as you execute on your journey towards Zero Trust. |
Beschreibung: | Includes index |
Beschreibung: | xxxii, 304 Seiten Illustrationen, Diagramme |
ISBN: | 9780137899739 |
Internformat
MARC
LEADER | 00000nam a22000001c 4500 | ||
---|---|---|---|
001 | BV049512565 | ||
003 | DE-604 | ||
005 | 20240129 | ||
007 | t | ||
008 | 240123s2024 a||| |||| 00||| eng d | ||
020 | |a 9780137899739 |9 978-0-13-789973-9 | ||
035 | |a (OCoLC)1422432039 | ||
035 | |a (DE-599)BVBBV049512565 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-83 | ||
100 | 1 | |a Green-Ortiz, Cindy |e Verfasser |4 aut | |
245 | 1 | 0 | |a Zero trust architecture |c Cindy Green-Ortiz, Brandon Fowler, David Houck, Hank Hensel, Patrick Lloyd, Andrew McDonald, Jason Frazier |
264 | 1 | |a San Jose, CA |b Cisco Press |c [2024] | |
264 | 4 | |c © 2024 | |
300 | |a xxxii, 304 Seiten |b Illustrationen, Diagramme | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Includes index | ||
520 | 3 | |a Today's organizations need a new security model that more effectively adapts to the complexity and risks of modern environments, embraces hybrid workplaces, and protects people, devices, apps, and data wherever they're located. Zero Trust is the first model with the potential to do all that. Zero Trust Architecture: Theory, Implementation, Maintenance, and Growth is the first comprehensive guide for architects, engineers, and other technical professionals who want to move from Zero Trust theory to implementation and successful ongoing operation. A team of Cisco's leading experts and implementers offer the most comprehensive and substantive guide to Zero Trust, bringing clarity, vision, practical definitions, and real-world expertise to a space that's been overwhelmed with hype. The authors explain why Zero Trust identity-based models can enable greater flexibility, simpler operations, intuitive context in the implementation and management of least privilege security. Then, building on Cisco's own model, they systematically illuminate methodologies, supporting technologies, and integrations required on the journey to any Zero Trust identity-based model. Through real world experiences and case study examples, you'll learn what questions to ask, how to start planning, what exists today, what solution components still must emerge and evolve, and how to drive value in the short-term as you execute on your journey towards Zero Trust. | |
650 | 0 | 7 | |a Datenschutz |0 (DE-588)4011134-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
653 | 0 | |a Computer networks / Security measures | |
653 | 0 | |a Business information services / Security measures | |
653 | 0 | |a Computer networks ; Security measures | |
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Datenschutz |0 (DE-588)4011134-9 |D s |
689 | 1 | |5 DE-604 | |
700 | 1 | |a Fowler, Brandon |e Verfasser |4 aut | |
700 | 1 | |a Houck, David |e Verfasser |4 aut | |
700 | 1 | |a Hensel, Hank |e Verfasser |4 aut | |
700 | 1 | |a Lloyd, Patrick |e Verfasser |4 aut | |
700 | 1 | |a McDonald, Andrew |e Verfasser |4 aut | |
700 | 1 | |a Frazier, Jason |e Verfasser |4 aut | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-0-13-789972-2 |
999 | |a oai:aleph.bib-bvb.de:BVB01-034858578 |
Datensatz im Suchindex
_version_ | 1804186328255954944 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Green-Ortiz, Cindy Fowler, Brandon Houck, David Hensel, Hank Lloyd, Patrick McDonald, Andrew Frazier, Jason |
author_facet | Green-Ortiz, Cindy Fowler, Brandon Houck, David Hensel, Hank Lloyd, Patrick McDonald, Andrew Frazier, Jason |
author_role | aut aut aut aut aut aut aut |
author_sort | Green-Ortiz, Cindy |
author_variant | c g o cgo b f bf d h dh h h hh p l pl a m am j f jf |
building | Verbundindex |
bvnumber | BV049512565 |
ctrlnum | (OCoLC)1422432039 (DE-599)BVBBV049512565 |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03148nam a22004811c 4500</leader><controlfield tag="001">BV049512565</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20240129 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">240123s2024 a||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780137899739</subfield><subfield code="9">978-0-13-789973-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1422432039</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV049512565</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-83</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Green-Ortiz, Cindy</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Zero trust architecture</subfield><subfield code="c">Cindy Green-Ortiz, Brandon Fowler, David Houck, Hank Hensel, Patrick Lloyd, Andrew McDonald, Jason Frazier</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">San Jose, CA</subfield><subfield code="b">Cisco Press</subfield><subfield code="c">[2024]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2024</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xxxii, 304 Seiten</subfield><subfield code="b">Illustrationen, Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">Today's organizations need a new security model that more effectively adapts to the complexity and risks of modern environments, embraces hybrid workplaces, and protects people, devices, apps, and data wherever they're located. Zero Trust is the first model with the potential to do all that. Zero Trust Architecture: Theory, Implementation, Maintenance, and Growth is the first comprehensive guide for architects, engineers, and other technical professionals who want to move from Zero Trust theory to implementation and successful ongoing operation. A team of Cisco's leading experts and implementers offer the most comprehensive and substantive guide to Zero Trust, bringing clarity, vision, practical definitions, and real-world expertise to a space that's been overwhelmed with hype. The authors explain why Zero Trust identity-based models can enable greater flexibility, simpler operations, intuitive context in the implementation and management of least privilege security. Then, building on Cisco's own model, they systematically illuminate methodologies, supporting technologies, and integrations required on the journey to any Zero Trust identity-based model. Through real world experiences and case study examples, you'll learn what questions to ask, how to start planning, what exists today, what solution components still must emerge and evolve, and how to drive value in the short-term as you execute on your journey towards Zero Trust.</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computer networks / Security measures</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Business information services / Security measures</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Fowler, Brandon</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Houck, David</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Hensel, Hank</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Lloyd, Patrick</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">McDonald, Andrew</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Frazier, Jason</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-0-13-789972-2</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-034858578</subfield></datafield></record></collection> |
id | DE-604.BV049512565 |
illustrated | Illustrated |
index_date | 2024-07-03T23:23:24Z |
indexdate | 2024-07-10T10:09:23Z |
institution | BVB |
isbn | 9780137899739 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-034858578 |
oclc_num | 1422432039 |
open_access_boolean | |
owner | DE-83 |
owner_facet | DE-83 |
physical | xxxii, 304 Seiten Illustrationen, Diagramme |
publishDate | 2024 |
publishDateSearch | 2024 |
publishDateSort | 2024 |
publisher | Cisco Press |
record_format | marc |
spelling | Green-Ortiz, Cindy Verfasser aut Zero trust architecture Cindy Green-Ortiz, Brandon Fowler, David Houck, Hank Hensel, Patrick Lloyd, Andrew McDonald, Jason Frazier San Jose, CA Cisco Press [2024] © 2024 xxxii, 304 Seiten Illustrationen, Diagramme txt rdacontent n rdamedia nc rdacarrier Includes index Today's organizations need a new security model that more effectively adapts to the complexity and risks of modern environments, embraces hybrid workplaces, and protects people, devices, apps, and data wherever they're located. Zero Trust is the first model with the potential to do all that. Zero Trust Architecture: Theory, Implementation, Maintenance, and Growth is the first comprehensive guide for architects, engineers, and other technical professionals who want to move from Zero Trust theory to implementation and successful ongoing operation. A team of Cisco's leading experts and implementers offer the most comprehensive and substantive guide to Zero Trust, bringing clarity, vision, practical definitions, and real-world expertise to a space that's been overwhelmed with hype. The authors explain why Zero Trust identity-based models can enable greater flexibility, simpler operations, intuitive context in the implementation and management of least privilege security. Then, building on Cisco's own model, they systematically illuminate methodologies, supporting technologies, and integrations required on the journey to any Zero Trust identity-based model. Through real world experiences and case study examples, you'll learn what questions to ask, how to start planning, what exists today, what solution components still must emerge and evolve, and how to drive value in the short-term as you execute on your journey towards Zero Trust. Datenschutz (DE-588)4011134-9 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Computer networks / Security measures Business information services / Security measures Computer networks ; Security measures Computersicherheit (DE-588)4274324-2 s DE-604 Datenschutz (DE-588)4011134-9 s Fowler, Brandon Verfasser aut Houck, David Verfasser aut Hensel, Hank Verfasser aut Lloyd, Patrick Verfasser aut McDonald, Andrew Verfasser aut Frazier, Jason Verfasser aut Erscheint auch als Online-Ausgabe 978-0-13-789972-2 |
spellingShingle | Green-Ortiz, Cindy Fowler, Brandon Houck, David Hensel, Hank Lloyd, Patrick McDonald, Andrew Frazier, Jason Zero trust architecture Datenschutz (DE-588)4011134-9 gnd Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)4011134-9 (DE-588)4274324-2 |
title | Zero trust architecture |
title_auth | Zero trust architecture |
title_exact_search | Zero trust architecture |
title_exact_search_txtP | Zero trust architecture |
title_full | Zero trust architecture Cindy Green-Ortiz, Brandon Fowler, David Houck, Hank Hensel, Patrick Lloyd, Andrew McDonald, Jason Frazier |
title_fullStr | Zero trust architecture Cindy Green-Ortiz, Brandon Fowler, David Houck, Hank Hensel, Patrick Lloyd, Andrew McDonald, Jason Frazier |
title_full_unstemmed | Zero trust architecture Cindy Green-Ortiz, Brandon Fowler, David Houck, Hank Hensel, Patrick Lloyd, Andrew McDonald, Jason Frazier |
title_short | Zero trust architecture |
title_sort | zero trust architecture |
topic | Datenschutz (DE-588)4011134-9 gnd Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Datenschutz Computersicherheit |
work_keys_str_mv | AT greenortizcindy zerotrustarchitecture AT fowlerbrandon zerotrustarchitecture AT houckdavid zerotrustarchitecture AT henselhank zerotrustarchitecture AT lloydpatrick zerotrustarchitecture AT mcdonaldandrew zerotrustarchitecture AT frazierjason zerotrustarchitecture |