Why Read This
In today's threat environment, the network perimeter has disappeared. Insiders are as insidious a threat as outsiders. In the past, the "trust but verify" model did not facilitate insight into internal and nontraditional threats. Forrester's new Zero Trust Model of information security demands that organizations know what types of activities take place on their internal network as well as their external network. To provide this type of deep insight into internal and external networks, Forrester has defined a new functional space called network analysis and visibility (NAV). NAV is comprised of a diverse tool set designed to provide situational awareness for networking and information security professionals.
Tags: Data & Information Protection, Data Loss Prevention (DLP), Data Management, Governance Risk & Compliance (GRC), Information Management, Infrastructure Security, Network Security, Regulations & Legislation, Security Operations, Security Risk & Compliance, Vulnerability & Threat Management, Zero Trust