While no solution can act as a single silver bullet to implement zero trust, its framework includes principles can be applied with a combination of various security practices and multiple tools.
Reduced attack surface
Data protection and compliance
Minimized Insider threats
Improved security posture
Enhanced end user productivity
Extended device and data sprawl
Zero Trust Principle | Corresponding Endpoint Central offerings |
---|---|
Always verify | Passcode compliance, Conditional access to corporate apps, O365 Management, Compliance management, OS attestation. |
Assume breach | Network isolation, geo-fencing, device restriction policies, Data loss prevention, flagging anomaly as true/false positive using anti-ransomware, mobile threat defense. |
Least Privilege access | Role based access control, geo-fencing, limit devices per user, restricted app distribution from private app store, endpoint privilege management. |