This book delves into the complexities of business settings. It covers the practical guidelines and requirements your security team will need to design and execute a zero-trust journey while maximizing the value of your current enterprise security architecture. The goal of Zero Trust is to radically alter the underlying concept and approach to enterprise security, moving away from old and clearly unsuccessful perimeter-centric techniques and toward a dynamic, identity-centric, and policy-based approach.
This book helps the readers to earn about IPS, IDS, and IDPS, along with their varieties and comparing them. It also covers Virtual Private Networks, types of VPNs.and also to understand how zero trust and VPN work together
By the completion of the book, you will be able to build a credible and defensible Zero Trust security architecture for your business, as well as implement a step-by-step process that will result in considerably better security and streamlined operations.
TABLE OF CONTENTS
1. Introduction to Enterprise Security
2. Get to Know Zero Trust
3. Architectures With Zero Trust
4. Zero Trust in Practice
5. Identity and Access Management (IAM)
6. Network Infrastructure
7. Network Access Control
8. Intrusion Detection and Prevention Systems
9. Virtual Private Networks
10. Next-Generation Firewalls
11. Security Operations
12. Privileged Access Management (PAM)
13. Data Protection
14. Infrastructure and Platform as a Service
15.Software as a Service (SaaS)
16. IoT Devices
17. A Policy of Zero Trust
18. Zero Trust Scenarios
19. Creating a Successful Zero Trust Environment