

Additionally, CrowdStrike announced new Zero Trust partner integrations with Airgap, Appgate, CyberArk, TruU and Twingate, all of whom will leverage CrowdStrike Falcon ZTA to help joint customers reduce their attack surface and simplify, empower and accelerate their Zero Trust journey. (Nasdaq: CRWD), a leader in cloud-delivered protection of endpoints, cloud workloads, identity and data, today announced the availability of CrowdStrike Falcon Zero Trust Assessment (ZTA) support for macOS and Linux platforms, extending comprehensive protection with an identity and data-centric approach across all platforms. We will also cover how Zscaler’s ZIA and ZPA platforms enable SDP and the CARTA ideals.CrowdStrike Holdings, Inc. In this video I’ll discuss the history of Zero Trust and what it really takes to deploy a solution that implements these ideals. This leaves a lot to sort through to get to how you actually architect your security. Software-Defined Perimeter (SDP), Google’s BeyondCorp initiative, Gartner’s Continuous Adaptive Risk and Trust Assessment (CARTA), and even older DoD and industry initiatives all have something to say about trust and access. The landscape can also be confusing when you start to hear other terms in use that have a similar message. The idea that we should no longer trust our networks, our users, or their devices without first verifying identity and status makes sense in this new work environment. Zero Trust has been receiving a lot of buzz in recent months, driven by mobility and BYOD that have brought new threats along with their productivity benefits.
