Why Read This
In today's threat environment, the network perimeter has disappeared. Insiders are as insidious a threat as outsiders. In the past, the "trust but verify" model did not facilitate insight into internal and nontraditional threats. Forrester's new Zero Trust Model of information security demands that organizations know what types of activities take place on their internal network as well as their external network. To provide this type of deep insight into internal and external networks, Forrester has defined a new functional space called network analysis and visibility (NAV). NAV is comprised of a diverse tool set designed to provide situational awareness for networking and information security professionals.
Tags: Data Protection, Information Leak Prevention, Information Protection, Infrastructure Security, Network Security, Regulations & Legislation, Security Operations, Security Standards, Regulations & Legislation, Security, Risk and Compliance, Vulnerability & Threat Management