{"id":19133,"date":"2021-08-27T23:42:02","date_gmt":"2021-08-27T23:42:02","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=19133"},"modified":"2021-08-27T23:58:22","modified_gmt":"2021-08-27T23:58:22","slug":"3-tests-to-ensure-zero-trust-network-security","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/networks\/3-tests-to-ensure-zero-trust-network-security\/","title":{"rendered":"3 Tests to Ensure Zero Trust Network Security"},"content":{"rendered":"<p>The COVID pandemic has highlighted the challenges of ensuring security across an expanding enterprise network forced to support more and more <a href=\"https:\/\/www.esecurityplanet.com\/endpoint\/remote-workforce-security\/\">remote workers<\/a>, an ever-increasing diversity of devices, and frequent mobility. Praveen Jain, founder and CEO of cloud networking startup WiteSand, spoke with <em>eSecurity Planet <\/em>about the challenges of maximizing security in today&#8217;s environment, the value of a <a href=\"https:\/\/www.esecurityplanet.com\/products\/zero-trust-security-solutions\/\">zero trust model<\/a> \u2013 and three key questions to address to make sure you&#8217;re on the right track.<\/p>\n<p>There&#8217;s an inherent weakness in the way security too often relies on a trust-but-verify model in which endpoints are given access to the network and are only quarantined when they&#8217;re determined to be infected, Jain, a former Cisco SVP and founder of Insieme Networks, told <em>eSecurity Planet<\/em>.<\/p>\n<figure id=\"attachment_19136\" aria-describedby=\"caption-attachment-19136\" style=\"width: 300px\" class=\"wp-caption alignright\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-19136\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2021\/08\/praveen-jain-300x300-1.jpeg\" alt=\"Praveen Jain\" width=\"300\" height=\"300\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/praveen-jain-300x300-1.jpeg 300w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/praveen-jain-300x300-1-150x150.jpeg 150w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><figcaption id=\"caption-attachment-19136\" class=\"wp-caption-text\">Praveen Jain, founder &amp; CEO, WiteSand<\/figcaption><\/figure>\n<p>The problem with that approach is that <a href=\"https:\/\/www.esecurityplanet.com\/threats\/malware-types\/\">malware<\/a> can remain dormant on a user device for a long time before threats actors move laterally through a network \u2013 and most current methods that count on perimeter security won&#8217;t notice that traffic flow.<\/p>\n<p>Employing a zero trust model instead, Jain said, ensures that endpoints only get network access post-authentication \u2013 and recognizes that most traffic will likely be to the Internet or a private data center, limiting lateral movement within the network via default deny policies (with exceptions for printers, conferencing, etc.). &#8220;There really is no reason laptops need to be able to talk to each other,&#8221; he said.<\/p>\n<h2>Network Security Grows in Complexity<\/h2>\n<p>Networking and security are far more complex today than they were even a decade ago, when trust-but-verify was sufficient. &#8220;The rise of remote work gave rise to the &#8216;borderless enterprise,&#8217; one which is characterized by workers moving fluidly between home and office, and by the proliferation of devices \u2013 mobiles, laptops, tablets \u2013 used to conduct business,&#8221; Jain said. &#8220;The pandemic added fuel to the fire by accelerating the irreversible trend.&#8221;<\/p>\n<p>Now that it&#8217;s no longer sufficient to enforce security only at infrastructure entry and exit points, security needs to be pervasive and based on zero trust, Jain said. &#8220;As the pandemic subsides and employees get back to work, the potential threats from <a href=\"https:\/\/www.esecurityplanet.com\/products\/patch-management-software\/\">unpatched<\/a> laptops and new mobile devices acquired during the pandemic require increased focus on securing the campus and branch networks from propagating any zero-day attacks,&#8221; he said.<\/p>\n<p>The answer, Jain said, is to deploy a series of security tools at various layers, with no implicit trust given to any device. &#8220;Each user or device \u2013 local or remote, wired or wireless \u2013 needs to be authenticated and authorized before granting access,&#8221; he said. &#8220;As a preventive measure, the ideal would be to block all unwanted communications among users and devices in the enterprise network so that, in the case of a zero-day attack, its lateral movement is limited.&#8221;<\/p>\n<p>The pandemic has vividly demonstrated the power of isolation for preventing viral contagion, and the same is true for protecting enterprise networks. &#8220;Many organizations worry about implementing so-called isolation or <a href=\"https:\/\/www.esecurityplanet.com\/networks\/microsegmentation-software\/\">microsegmentation<\/a> in the existing network, as they have limited or no knowledge of communication patterns among devices and users to determine what is valid versus what is not,&#8221; Jain said. &#8220;In the spirit of an already working network, they often tend to leave it unaddressed.&#8221;<\/p>\n<p>New security tools that allow running in monitoring mode first, then selectively blocking unwanted communications, can be an excellent way to address that gap, Jain said.<\/p>\n<p>Jain \u2013 who has held positions in three startups acquired by Cisco (and former Cisco CEO John Chambers is now running Pensando Systems, an edge computing startup co-founded by Jain) \u2013 is now at the helm of WiteSand, which emerged from stealth mode in June with $12.5 million in seed funding and bills itself as the first &#8220;zero trust network as a service.&#8221; He talked with <em>eSecurity Planet<\/em> about what he sees as three important network security tests.<\/p>\n<h2>Three Network Security Tests<\/h2>\n<p>Jain suggests using the following three baseline tests to evaluate the security of an enterprise network:<\/p>\n<ol>\n<li><em>Can you ping one of your peers&#8217; laptops from your laptop in the office?<\/em> &#8220;There is a good chance that you can,&#8221; he said. &#8220;It&#8217;s worth asking why this communication is allowed. Is there really ever a need to log into other employees&#8217; laptops? Why are laptops not isolated from other laptops? The problem of this open communication is that if one of the employee laptops is infected by a zero-day exploit, it may laterally propagate into other laptops.&#8221;<\/li>\n<li><em>Are your IoT and other devices properly segmented?<\/em> &#8220;If your IoT camera is supposed to talk to an on-prem DVR to store the recordings, are these fully segmented to only allow that communication? If not, any attack on an IoT camera or DVR may spread laterally to other parts of the network.&#8221;<\/li>\n<li><em>Are any of your offices still using a pre-shared password to connect to corporate Wi-Fi? <\/em>&#8220;You may think, &#8216;No way!&#8217; but you will likely be surprised with the reality, unless you have deployed a <a href=\"https:\/\/www.esecurityplanet.com\/products\/network-access-control-solutions\/\">network access control<\/a> solution or equivalent that can authenticate employees to a trusted company identity source such as <a href=\"https:\/\/www.esecurityplanet.com\/products\/active-directory-security-tools\/\">Active Directory<\/a>. If you haven&#8217;t, you should know that an ex-employee can hop onto the corporate Wi-Fi network from the company parking lot.&#8221;<\/li>\n<\/ol>\n<p>Another way to maximize security in the face of current threats is to deploy a &#8220;network DVR&#8221; to record all authentication processes for all devices, making it possible to look back and see who was affected, when and where they were affected, and if anyone else was affected. &#8220;With all activity recorded \u2013 all employees, BYOD, guests, and IoT devices \u2013 a complete forensic record exists,&#8221; Jain said.<\/p>\n<p>Ultimately, Jain said, the goal should be to move away from manual configuration, working towards 360-degree visibility of the network to ensure consistent policies across all devices and locations.<\/p>\n<p>Further reading: <a href=\"https:\/\/www.esecurityplanet.com\/trends\/zero-trust-challenges\/\">Zero Trust Can\u2019t Protect Everything. Here\u2019s What You Need to Watch.<\/a><\/p>\n\n\n<div id=\"ta-campaign-widget-66d70720867ab-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d70720867ab\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d70720867ab\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d70720867ab\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d70720867ab\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d70720867ab\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d70720867ab\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>The COVID pandemic has highlighted the challenges of ensuring security across an expanding enterprise network forced to support more and more remote workers, an ever-increasing diversity of devices, and frequent mobility. Praveen Jain, founder and CEO of cloud networking startup WiteSand, spoke with eSecurity Planet about the challenges of maximizing security in today&#8217;s environment, the [&hellip;]<\/p>\n","protected":false},"author":166,"featured_media":19139,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[14],"tags":[3414,30581],"b2b_audience":[33],"b2b_industry":[],"b2b_product":[381],"class_list":["post-19133","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-networks","tag-network-security","tag-zero-trust-security","b2b_audience-awareness-and-consideration","b2b_product-network-access-control-nac"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>3 Tests to Ensure Zero Trust Network Security | eSecurity Planet<\/title>\n<meta name=\"description\" content=\"Former Cisco SVP Praveen Jain discusses his latest venture at WiteSand and the importance of getting zero trust security right.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/networks\/3-tests-to-ensure-zero-trust-network-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"3 Tests to Ensure Zero Trust Network Security | eSecurity Planet\" \/>\n<meta property=\"og:description\" content=\"Former Cisco SVP Praveen Jain discusses his latest venture at WiteSand and the importance of getting zero trust security right.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/networks\/3-tests-to-ensure-zero-trust-network-security\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2021-08-27T23:42:02+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-08-27T23:58:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/Networking-08-1088x725-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1088\" \/>\n\t<meta property=\"og:image:height\" content=\"725\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jeff Goldman\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jeff Goldman\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/3-tests-to-ensure-zero-trust-network-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/3-tests-to-ensure-zero-trust-network-security\/\"},\"author\":{\"name\":\"Jeff Goldman\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/814377f0182cc43200a4581fba4ec795\"},\"headline\":\"3 Tests to Ensure Zero Trust Network Security\",\"datePublished\":\"2021-08-27T23:42:02+00:00\",\"dateModified\":\"2021-08-27T23:58:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/3-tests-to-ensure-zero-trust-network-security\/\"},\"wordCount\":990,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/3-tests-to-ensure-zero-trust-network-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/Networking-08-1088x725-1.jpg\",\"keywords\":[\"network security\",\"zero trust security\"],\"articleSection\":[\"Networks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/3-tests-to-ensure-zero-trust-network-security\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/networks\/3-tests-to-ensure-zero-trust-network-security\/\",\"name\":\"3 Tests to Ensure Zero Trust Network Security | eSecurity Planet\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/3-tests-to-ensure-zero-trust-network-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/3-tests-to-ensure-zero-trust-network-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/Networking-08-1088x725-1.jpg\",\"datePublished\":\"2021-08-27T23:42:02+00:00\",\"dateModified\":\"2021-08-27T23:58:22+00:00\",\"description\":\"Former Cisco SVP Praveen Jain discusses his latest venture at WiteSand and the importance of getting zero trust security right.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/3-tests-to-ensure-zero-trust-network-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/networks\/3-tests-to-ensure-zero-trust-network-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/3-tests-to-ensure-zero-trust-network-security\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/Networking-08-1088x725-1.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/Networking-08-1088x725-1.jpg\",\"width\":1088,\"height\":725,\"caption\":\"network security\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/3-tests-to-ensure-zero-trust-network-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"3 Tests to Ensure Zero Trust Network Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/814377f0182cc43200a4581fba4ec795\",\"name\":\"Jeff Goldman\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/jeff-goldman-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/jeff-goldman-150x150.jpg\",\"caption\":\"Jeff Goldman\"},\"description\":\"eSecurity Planet contributor Jeff Goldman has been a technology journalist for more than 20 years and an eSecurity Planet contributor since 2009. He's also written extensively about wireless and broadband infrastructure and semiconductor engineering. He started his career at MTV, but soon decided that technology writing was a more promising path.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/jeff-goldman\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"3 Tests to Ensure Zero Trust Network Security | eSecurity Planet","description":"Former Cisco SVP Praveen Jain discusses his latest venture at WiteSand and the importance of getting zero trust security right.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/networks\/3-tests-to-ensure-zero-trust-network-security\/","og_locale":"en_US","og_type":"article","og_title":"3 Tests to Ensure Zero Trust Network Security | eSecurity Planet","og_description":"Former Cisco SVP Praveen Jain discusses his latest venture at WiteSand and the importance of getting zero trust security right.","og_url":"https:\/\/www.esecurityplanet.com\/networks\/3-tests-to-ensure-zero-trust-network-security\/","og_site_name":"eSecurity Planet","article_published_time":"2021-08-27T23:42:02+00:00","article_modified_time":"2021-08-27T23:58:22+00:00","og_image":[{"width":1088,"height":725,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/Networking-08-1088x725-1.jpg","type":"image\/jpeg"}],"author":"Jeff Goldman","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Jeff Goldman","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/networks\/3-tests-to-ensure-zero-trust-network-security\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/3-tests-to-ensure-zero-trust-network-security\/"},"author":{"name":"Jeff Goldman","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/814377f0182cc43200a4581fba4ec795"},"headline":"3 Tests to Ensure Zero Trust Network Security","datePublished":"2021-08-27T23:42:02+00:00","dateModified":"2021-08-27T23:58:22+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/3-tests-to-ensure-zero-trust-network-security\/"},"wordCount":990,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/3-tests-to-ensure-zero-trust-network-security\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/Networking-08-1088x725-1.jpg","keywords":["network security","zero trust security"],"articleSection":["Networks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/networks\/3-tests-to-ensure-zero-trust-network-security\/","url":"https:\/\/www.esecurityplanet.com\/networks\/3-tests-to-ensure-zero-trust-network-security\/","name":"3 Tests to Ensure Zero Trust Network Security | eSecurity Planet","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/3-tests-to-ensure-zero-trust-network-security\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/3-tests-to-ensure-zero-trust-network-security\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/Networking-08-1088x725-1.jpg","datePublished":"2021-08-27T23:42:02+00:00","dateModified":"2021-08-27T23:58:22+00:00","description":"Former Cisco SVP Praveen Jain discusses his latest venture at WiteSand and the importance of getting zero trust security right.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/3-tests-to-ensure-zero-trust-network-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/networks\/3-tests-to-ensure-zero-trust-network-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/networks\/3-tests-to-ensure-zero-trust-network-security\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/Networking-08-1088x725-1.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/Networking-08-1088x725-1.jpg","width":1088,"height":725,"caption":"network security"},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/networks\/3-tests-to-ensure-zero-trust-network-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"3 Tests to Ensure Zero Trust Network Security"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/814377f0182cc43200a4581fba4ec795","name":"Jeff Goldman","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/jeff-goldman-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/jeff-goldman-150x150.jpg","caption":"Jeff Goldman"},"description":"eSecurity Planet contributor Jeff Goldman has been a technology journalist for more than 20 years and an eSecurity Planet contributor since 2009. He's also written extensively about wireless and broadband infrastructure and semiconductor engineering. He started his career at MTV, but soon decided that technology writing was a more promising path.","url":"https:\/\/www.esecurityplanet.com\/author\/jeff-goldman\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/19133"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/166"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=19133"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/19133\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/19139"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=19133"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=19133"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=19133"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=19133"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=19133"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=19133"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}