<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Segmentation on Security in 45 | Cisco Security Podcast</title><link>https://www.securityin45.com/tags/segmentation/</link><description>Recent content in Segmentation on Security in 45 | Cisco Security Podcast</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Mon, 30 Mar 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://www.securityin45.com/tags/segmentation/index.xml" rel="self" type="application/rss+xml"/><item><title>Cisco ISE Configuration Guide: 802.1X, Profiling, and Secure Access</title><link>https://www.securityin45.com/blog/2026-03-30-cisco-ise-configuration-guide/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://www.securityin45.com/blog/2026-03-30-cisco-ise-configuration-guide/</guid><description>&lt;p&gt;Cisco Identity Services Engine (ISE) is the policy backbone of a &lt;a href="https://www.securityin45.com/pillars/zero-trust/"&gt;zero trust&lt;/a&gt; network. It answers the fundamental question: who and what is connecting to my network, and what should they be allowed to do? Whether you are enforcing 802.1X authentication on wired switch ports, wireless SSIDs, or VPN connections through a Cisco FTD firewall, ISE is the centralized policy decision point that ties it all together.&lt;/p&gt;
&lt;p&gt;This guide walks through a practical ISE deployment covering switch configuration, Windows supplicant setup, FMC/FTD integration for VPN, profiling basics, and the policy sets that make it all work. We assume ISE is already installed and licensed — this guide focuses on the configuration that matters.&lt;/p&gt;</description></item><item><title>Zero Trust Architecture: Real-World Examples &amp; Implementation</title><link>https://www.securityin45.com/blog/2026-02-09-zero-trust-in-the-real-world/</link><pubDate>Mon, 09 Feb 2026 00:00:00 +0000</pubDate><guid>https://www.securityin45.com/blog/2026-02-09-zero-trust-in-the-real-world/</guid><description>&lt;pre&gt;&lt;code&gt; Perimeter security is dead. The network boundary that once defined our security strategy has dissolved into cloud services, remote work, and distributed infrastructure. [Zero Trust](/pillars/zero-trust/) Architecture represents a fundamental shift in how we think about access control and threat prevention—one where no user, device, or application is trusted by default, regardless of whether they're inside or outside the traditional network edge. In this episode, Mike and Andres explore real-world examples and practical implementation strategies that show what Zero Trust actually looks like when deployed at scale. If you're still relying on the assumption that &amp;quot;inside the firewall = safe,&amp;quot; this conversation is essential.
&lt;/code&gt;&lt;/pre&gt;
&lt;h2 id="what-this-episode-covers"&gt;What This Episode Covers&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Zero Trust fundamentals&lt;/strong&gt;: Moving from perimeter-based security to a &amp;ldquo;never trust, always verify&amp;rdquo; model&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Architectural components&lt;/strong&gt;: Practical elements like micro-segmentation, identity verification, and continuous authentication&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Real-world deployment examples&lt;/strong&gt;: How organizations like Google implement Zero Trust at enterprise scale&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Key architectural principles&lt;/strong&gt;: Understanding trust boundaries, protected surfaces, and shifting security controls&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Government &amp;amp; regulatory perspective&lt;/strong&gt;: CISA guidance and public sector Zero Trust adoption strategies&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Implementation pathways&lt;/strong&gt;: Actionable steps for teams beginning their Zero Trust journey&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Common misconceptions&lt;/strong&gt;: Why Zero Trust isn&amp;rsquo;t just a technology, but a mindset shift&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="deep-dive"&gt;Deep Dive&lt;/h2&gt;
&lt;h3 id="understanding-zero-trust-architecture-beyond-the-perimeter"&gt;Understanding Zero Trust Architecture: Beyond the Perimeter&lt;/h3&gt;
&lt;p&gt;For decades, network security operated on a castle-and-moat model. You built a strong perimeter, and everything inside was assumed safe. Zero Trust completely inverts this assumption. Rather than creating a fortress around your network, Zero Trust assumes breach is inevitable and designs security controls accordingly.&lt;/p&gt;</description></item><item><title>Network Segmentation Strategy: Micro vs VLAN Approaches</title><link>https://www.securityin45.com/blog/2024-12-13-s2-e3-breaking-down-segmentation-with-chad-buey-and-sam-baxter/</link><pubDate>Fri, 13 Dec 2024 00:00:00 +0000</pubDate><guid>https://www.securityin45.com/blog/2024-12-13-s2-e3-breaking-down-segmentation-with-chad-buey-and-sam-baxter/</guid><description>&lt;pre&gt;&lt;code&gt; Network segmentation remains one of the most critical—yet surprisingly underutilized—pillars of enterprise security. As cyber threats grow more sophisticated and breach containment becomes a primary concern, organizations are discovering that a solid segmentation strategy can mean the difference between a localized incident and a company-wide catastrophe. But segmentation isn't one-size-fits-all; the debate between traditional VLAN-based approaches and modern micro-segmentation strategies has evolved considerably over the past decade, especially as cloud environments and dynamic workloads have fundamentally changed how we think about network boundaries.
&lt;/code&gt;&lt;/pre&gt;
&lt;h2 id="what-this-episode-covers"&gt;What This Episode Covers&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;The evolution of network segmentation strategies over the past ten years&lt;/li&gt;
&lt;li&gt;VLAN-based segmentation versus micro-segmentation approaches&lt;/li&gt;
&lt;li&gt;How group-based policy (GBP) enables more granular control than traditional VLAN segmentation&lt;/li&gt;
&lt;li&gt;Proactive versus reactive segmentation and their roles in Zero Trust architecture&lt;/li&gt;
&lt;li&gt;Enforcement mechanisms including VLANs, zone-based firewalls, and access control lists&lt;/li&gt;
&lt;li&gt;Cisco TrustSec and Security Group Tags (SGTs) as enforcement tools&lt;/li&gt;
&lt;li&gt;Cloud considerations and dynamic segmentation&lt;/li&gt;
&lt;li&gt;How Cisco solutions (ISE, Duo, Multi-Cloud Defense) integrate to support segmentation&lt;/li&gt;
&lt;li&gt;Designing segmentation to limit blast radius and contain breaches&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="deep-dive"&gt;Deep Dive&lt;/h2&gt;
&lt;h3 id="the-evolution-of-network-segmentation"&gt;The Evolution of Network Segmentation&lt;/h3&gt;
&lt;p&gt;Ten years ago, network segmentation was relatively straightforward: you created VLANs, separated traffic by business function or department, and called it a day. Today&amp;rsquo;s threat landscape and infrastructure complexity have rendered that approach insufficient for serious security programs.&lt;/p&gt;</description></item><item><title>Cloud Security Posture Management: AWS, Azure, GCP</title><link>https://www.securityin45.com/blog/2024-10-02-securing-the-cloud-with-sudhir-desai-and-ed-mcnicholas/</link><pubDate>Wed, 02 Oct 2024 00:00:00 +0000</pubDate><guid>https://www.securityin45.com/blog/2024-10-02-securing-the-cloud-with-sudhir-desai-and-ed-mcnicholas/</guid><description>&lt;pre&gt;&lt;code&gt; As organizations accelerate their cloud migration strategies, the security complexity multiplies exponentially. With workloads distributed across AWS, Azure, and GCP—each with their own security models, compliance requirements, and configuration options—the traditional perimeter-based security approach no longer applies. Organizations are increasingly turning to [zero trust](/pillars/zero-trust/) principles to address these challenges. In this latest episode of Security in 45, hosts Mike Veedock and Andres Sarmiento tackle one of the most pressing challenges facing modern enterprises: how to maintain visibility and control over your cloud security posture as you scale across multiple providers.
&lt;/code&gt;&lt;/pre&gt;
&lt;h2 id="what-this-episode-covers"&gt;What This Episode Covers&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;The strategic and operational benefits of cloud migration&lt;/li&gt;
&lt;li&gt;Characteristics and differences between major cloud providers (AWS, Azure, GCP)&lt;/li&gt;
&lt;li&gt;Essential security controls for cloud environments (MFA, network segmentation, encryption)&lt;/li&gt;
&lt;li&gt;The critical role of Cloud Security Posture Management (CSPM) tools&lt;/li&gt;
&lt;li&gt;Common cloud security risks and threat landscapes&lt;/li&gt;
&lt;li&gt;Industry resources for deepening cloud security knowledge&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="deep-dive"&gt;Deep Dive&lt;/h2&gt;
&lt;h3 id="the-business-case-for-cloud-migration"&gt;The Business Case for Cloud Migration&lt;/h3&gt;
&lt;p&gt;Cloud adoption has become less of a competitive advantage and more of a business necessity. Organizations are moving to the cloud not just for the &amp;ldquo;cool factor,&amp;rdquo; but for tangible, measurable benefits that directly impact the bottom line.&lt;/p&gt;</description></item><item><title>Firewall Evolution: Cisco's PIX to FTD Journey Explained</title><link>https://www.securityin45.com/blog/2024-10-02-firewall-with-keyonna-brown-and-rob-couture/</link><pubDate>Wed, 02 Oct 2024 00:00:00 +0000</pubDate><guid>https://www.securityin45.com/blog/2024-10-02-firewall-with-keyonna-brown-and-rob-couture/</guid><description>&lt;pre&gt;&lt;code&gt; Firewall technology has been the cornerstone of network security for decades, yet the landscape continues to evolve at a rapid pace. In the latest episode of &amp;quot;Security in 45,&amp;quot; hosts Mike Veedock and Andres Sarmiento explore Cisco's remarkable journey from the PIX firewall era through ASA and into the modern Firepower Threat Defense (FTD) platform. This evolution tells a compelling story about how security must constantly adapt to emerging threats while balancing innovation with operational efficiency. Whether you're managing legacy systems or planning next-generation deployments, understanding this trajectory provides crucial context for making informed decisions about your organization's firewall strategy.
&lt;/code&gt;&lt;/pre&gt;
&lt;h2 id="what-this-episode-covers"&gt;What This Episode Covers&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Cisco&amp;rsquo;s firewall evolution&lt;/strong&gt;: The progression from PIX to ASA to FTD and what each generation addressed&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Firepower Threat Defense (FTD)&lt;/strong&gt;: Modern capabilities and flexible deployment models&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Encrypted Visibility Engine (EVE)&lt;/strong&gt;: Analyzing encrypted traffic without sacrificing privacy&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Management flexibility&lt;/strong&gt;: Cloud-based, on-premises, and hybrid management options&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Identity-based security policies&lt;/strong&gt;: Integration with Active Directory for user-centric access control&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Third-party integration&lt;/strong&gt;: Ecosystem approach to security orchestration&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Hands-on learning&lt;/strong&gt;: Cisco&amp;rsquo;s webinar series and sandbox environments for practical engagement&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Future direction&lt;/strong&gt;: Upcoming innovations like Cisco &lt;a href="https://www.securityin45.com/pillars/xdr/"&gt;Extended Detection and Response (XDR)&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="deep-dive"&gt;Deep Dive&lt;/h2&gt;
&lt;h3 id="understanding-ciscos-firewall-evolution-from-pix-to-ftd"&gt;Understanding Cisco&amp;rsquo;s Firewall Evolution: From PIX to FTD&lt;/h3&gt;
&lt;p&gt;To appreciate where Cisco&amp;rsquo;s firewall technology stands today, it&amp;rsquo;s important to understand the historical context. The PIX firewall, introduced in the mid-1990s, was revolutionary for its time—it delivered stateful inspection and became the gold standard for perimeter defense. However, as threats evolved and networks became more complex, the need for more sophisticated capabilities became apparent.&lt;/p&gt;</description></item><item><title>Multicloud Defense: Unified Visibility Across Cloud Environments</title><link>https://www.securityin45.com/blog/2024-10-02-multicloud-defense-with-jason-lunde-and-sudhir-desai/</link><pubDate>Wed, 02 Oct 2024 00:00:00 +0000</pubDate><guid>https://www.securityin45.com/blog/2024-10-02-multicloud-defense-with-jason-lunde-and-sudhir-desai/</guid><description>&lt;pre&gt;&lt;code&gt; As organizations continue their migration to cloud infrastructure, many find themselves juggling security across multiple cloud providers—AWS, Azure, Google Cloud, and more. The complexity multiplies when you're trying to maintain visibility and enforce consistent security policies across disparate environments, each with its own native security tools and management consoles. This fragmentation not only creates operational headaches but introduces dangerous blind spots where threats can slip through the cracks. In this episode, Mike Veedock and Andres Sarmiento explore how Cisco Multicloud Defense addresses this critical challenge by delivering unified security visibility and control across your entire cloud footprint.
&lt;/code&gt;&lt;/pre&gt;
&lt;h2 id="what-this-episode-covers"&gt;What This Episode Covers&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Unified visibility across multicloud environments&lt;/strong&gt; — How to achieve a single pane of glass for security monitoring regardless of which cloud providers you use&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Automated threat detection and response&lt;/strong&gt; — The role of AI and machine learning in identifying sophisticated attacks without manual intervention&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Centralized management and configuration&lt;/strong&gt; — Simplifying security operations by consolidating control into one platform&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Scalability for organizations of all sizes&lt;/strong&gt; — Ensuring your security infrastructure grows with your business&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Compliance and regulatory alignment&lt;/strong&gt; — Meeting standards like PCI DSS and HIPAA across cloud deployments&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Real-world protection scenarios&lt;/strong&gt; — Defense against malware, ransomware, DDoS, and other contemporary threats&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="deep-dive"&gt;Deep Dive&lt;/h2&gt;
&lt;h3 id="the-multicloud-reality-why-unified-visibility-matters"&gt;The Multicloud Reality: Why Unified Visibility Matters&lt;/h3&gt;
&lt;p&gt;Most enterprise organizations today don&amp;rsquo;t operate in a single cloud environment. Instead, they&amp;rsquo;ve adopted a multicloud strategy—deliberately using multiple cloud providers to avoid vendor lock-in, optimize costs, take advantage of best-of-breed services, or meet regional compliance requirements. While this flexibility offers significant advantages, it creates substantial security challenges.&lt;/p&gt;</description></item><item><title>Zero Trust Identity Management with Cisco ISE</title><link>https://www.securityin45.com/blog/2024-10-02-identity-management-with-john-newman-and-sam-baxter/</link><pubDate>Wed, 02 Oct 2024 00:00:00 +0000</pubDate><guid>https://www.securityin45.com/blog/2024-10-02-identity-management-with-john-newman-and-sam-baxter/</guid><description>&lt;pre&gt;&lt;code&gt; In today's threat landscape, traditional perimeter-based security is no longer sufficient—attackers are already inside your network, and trust is no longer a default setting. Identity and Access Management (IAM) has evolved from a compliance checkbox into a critical security control, with [Zero Trust](/pillars/zero-trust/) architecture now representing the gold standard for enterprise access governance. Cisco's Identity Services Engine (ISE) addresses this shift head-on, providing the centralized intelligence and policy enforcement needed to authenticate and authorize every access request, regardless of where it originates. For IT leaders and security practitioners grappling with increasingly complex hybrid and cloud environments, understanding how modern IAM solutions like ISE can enforce Zero Trust principles is no longer optional—it's essential to survival.
&lt;/code&gt;&lt;/pre&gt;
&lt;h2 id="what-this-episode-covers"&gt;What This Episode Covers&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Centralized Access Control and Policy Enforcement&lt;/strong&gt; — How ISE enables administrators to define granular, context-aware access policies based on user identity, device type, and other security attributes&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Zero Trust Architecture&lt;/strong&gt; — The shift from implicit trust to explicit verification for every access request, and how ISE operationalizes this model&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Endpoint Visibility and Device Profiling&lt;/strong&gt; — Gaining real-time insight into all connected devices and using that data to segment and control network access&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;&lt;a href="https://www.securityin45.com/glossary/"&gt;Multi-Factor Authentication&lt;/a&gt; Integration&lt;/strong&gt; — Layering identity verification to reduce the risk of compromised credentials&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Ecosystem Integration&lt;/strong&gt; — How ISE works alongside other Cisco security solutions to create a cohesive security fabric&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="deep-dive"&gt;Deep Dive&lt;/h2&gt;
&lt;h3 id="centralized-access-control-and-policy-enforcement"&gt;Centralized Access Control and Policy Enforcement&lt;/h3&gt;
&lt;p&gt;At its core, IAM is about answering a simple but critical question: &lt;em&gt;Who should be allowed to access what, and under what conditions?&lt;/em&gt; Cisco ISE provides a centralized platform for defining and enforcing the answer to that question across your entire network.&lt;/p&gt;</description></item><item><title>Zero Trust Network Access: Cisco Secure Access Explained</title><link>https://www.securityin45.com/blog/2024-10-02-secure-access-with-david-keller-and-justin-murphy/</link><pubDate>Wed, 02 Oct 2024 00:00:00 +0000</pubDate><guid>https://www.securityin45.com/blog/2024-10-02-secure-access-with-david-keller-and-justin-murphy/</guid><description>&lt;pre&gt;&lt;code&gt; The traditional perimeter-based security model is dead. As organizations embrace hybrid work, cloud-first strategies, and multi-device workforces, the old castle-and-moat approach simply doesn't cut it anymore. [Zero Trust](/pillars/zero-trust/) Network Access has emerged as the gold standard for modern enterprise security, but understanding how to implement it effectively requires grappling with complex architectural concepts and integration challenges. This episode dives deep into how Cisco Secure Access brings Zero Trust principles to life through an integrated platform that assumes no user or device is trustworthy by default.
&lt;/code&gt;&lt;/pre&gt;
&lt;h2 id="what-this-episode-covers"&gt;What This Episode Covers&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Cisco Secure Services Edge (SSE):&lt;/strong&gt; The foundational platform combining network access control (NAC), identity-based access control (IBAC), and endpoint security&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Secure Web Gateway (SWG):&lt;/strong&gt; Web-based threat protection against malware, phishing, and ransomware&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Cloud Access Security Broker (&lt;a href="https://www.securityin45.com/glossary/"&gt;CASB&lt;/a&gt;):&lt;/strong&gt; Safeguarding cloud applications and data from unauthorized access&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Zero Trust Network Access (ZTNA):&lt;/strong&gt; Identity and device posture-based access control regardless of user location&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Secure Internet Gateway (SIG):&lt;/strong&gt; Defense against internet-based threats including DDoS and APTs&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Integration and ecosystem:&lt;/strong&gt; How Cisco Secure Access works seamlessly with other Cisco security solutions&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="deep-dive"&gt;Deep Dive&lt;/h2&gt;
&lt;h3 id="understanding-cisco-secure-services-edge-sse"&gt;Understanding Cisco Secure Services Edge (SSE)&lt;/h3&gt;
&lt;p&gt;Cisco SSE represents a fundamental shift in how organizations think about network security. Rather than relying on IP addresses and network location to determine trust, SSE implements a multi-layered approach that evaluates every access request based on multiple factors.&lt;/p&gt;</description></item><item><title>Zero Trust Security Strategy: Expert Insights on Implementation</title><link>https://www.securityin45.com/blog/2024-10-02-xdr-with-briana-farro-nate-austin-and-matt-robertson/</link><pubDate>Wed, 02 Oct 2024 00:00:00 +0000</pubDate><guid>https://www.securityin45.com/blog/2024-10-02-xdr-with-briana-farro-nate-austin-and-matt-robertson/</guid><description>&lt;pre&gt;&lt;code&gt; In an era where traditional perimeter-based security has become obsolete, organizations are racing to adopt a fundamentally different approach to protecting their digital assets. [Zero trust](/pillars/zero-trust/) security—a concept that's been around for over two decades—has finally moved from industry buzzword to business imperative, especially as remote work, cloud migration, and sophisticated threat actors have rendered castle-and-moat security architectures dangerously ineffective. But implementing zero trust isn't about buying a single product or flipping a switch; it's a strategic journey that requires careful planning, the right mix of technologies, and a commitment to continuous improvement. In this episode of Security in 45, hosts Mike Veedock and Andres Sarmiento explore what zero trust really means, how to approach implementation, and the critical technologies that make it work in practice.
&lt;/code&gt;&lt;/pre&gt;
&lt;h2 id="what-this-episode-covers"&gt;What This Episode Covers&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;The origins and evolution of zero trust as an industry concept&lt;/li&gt;
&lt;li&gt;Why zero trust is fundamentally different from traditional security models&lt;/li&gt;
&lt;li&gt;The role of multi-factor authentication (MFA) in zero trust strategies&lt;/li&gt;
&lt;li&gt;Endpoint protection and network segmentation as core pillars&lt;/li&gt;
&lt;li&gt;Real-world examples of zero trust in consumer and enterprise contexts&lt;/li&gt;
&lt;li&gt;The importance of balancing security with user experience&lt;/li&gt;
&lt;li&gt;Why a multi-vendor approach is essential to comprehensive zero trust deployment&lt;/li&gt;
&lt;li&gt;Practical considerations for planning and implementing zero trust initiatives&lt;/li&gt;
&lt;li&gt;Common pitfalls and how to avoid rushing implementation&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="deep-dive"&gt;Deep Dive&lt;/h2&gt;
&lt;h3 id="understanding-zero-trust-beyond-the-buzzword"&gt;Understanding Zero Trust: Beyond the Buzzword&lt;/h3&gt;
&lt;p&gt;Zero trust isn&amp;rsquo;t a new invention—the concept emerged more than 20 years ago as security professionals recognized that the traditional model of &amp;ldquo;trust but verify&amp;rdquo; was fundamentally flawed. In a zero trust framework, the basic assumption is inverted: &lt;em&gt;nothing&lt;/em&gt; is trusted by default, whether it originates from inside or outside the network perimeter. Every access request, every user, every device, and every application must be verified and validated before granting access.&lt;/p&gt;</description></item><item><title>Zero Trust Security: Beyond Products to Concepts</title><link>https://www.securityin45.com/blog/2024-10-02-zero-trust-with-estefania-fernandez-and-neil-lovering/</link><pubDate>Wed, 02 Oct 2024 00:00:00 +0000</pubDate><guid>https://www.securityin45.com/blog/2024-10-02-zero-trust-with-estefania-fernandez-and-neil-lovering/</guid><description>&lt;pre&gt;&lt;code&gt; Zero Trust has become one of the most talked-about concepts in enterprise security, yet many organizations still struggle to understand what it actually means—and more importantly, how to implement it. If you think Zero Trust is just another security product you can buy off the shelf and deploy, you're missing the point entirely. In this episode, hosts Mike Veedock and Andres Sarmiento dive deep with industry experts to explore Zero Trust not as a destination, but as a foundational security philosophy that requires careful planning, the right mix of technologies, and a fundamental shift in how organizations approach access control.
&lt;/code&gt;&lt;/pre&gt;
&lt;h2 id="what-this-episode-covers"&gt;What This Episode Covers&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Zero Trust as a concept, not a product&lt;/strong&gt; — understanding why Zero Trust is an industry framework rather than a single solution you can purchase&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;The 20+ year evolution&lt;/strong&gt; — how Zero Trust originated and why it&amp;rsquo;s more relevant today than ever&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Real-world examples&lt;/strong&gt; — from everyday social media privacy settings to enterprise banking authentication&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Multi-factor authentication (MFA) as a cornerstone&lt;/strong&gt; — why passwords alone are no longer sufficient&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Endpoint protection and segmentation&lt;/strong&gt; — critical technologies in the Zero Trust journey&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;The multi-vendor approach&lt;/strong&gt; — why comprehensive security requires coordinating multiple solutions&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Implementation strategy&lt;/strong&gt; — the importance of careful planning, identifying priorities, and avoiding rushed deployments&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Balancing security with usability&lt;/strong&gt; — maintaining user experience while strengthening defenses&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="deep-dive"&gt;Deep Dive&lt;/h2&gt;
&lt;h3 id="zero-trust-concept-not-product"&gt;Zero Trust: Concept, Not Product&lt;/h3&gt;
&lt;p&gt;One of the most critical misconceptions in enterprise security is treating Zero Trust as a product—something you can procure from a single vendor and deploy to solve your security problems. The reality is quite different. &lt;a href="https://www.securityin45.com/pillars/zero-trust/"&gt;Zero Trust&lt;/a&gt; is an industry concept that has evolved over more than two decades and represents a fundamental shift in security philosophy.&lt;/p&gt;</description></item></channel></rss>