

But to be clear, when I say Zero Trust, I mean the following: I believe that my view of Zero Trust is well aligned with Google’s BeyondCorp. Just like with any other IT buzz words, everyone you ask will give you their own take on what Zero Trust means. So, I started a dialog with the product teams to add the missing functionality and I’m happy to say that this spring, the last piece of the puzzle arrived. After some investigation, I identified a few gaps in our offering. As a member of this team, I have the opportunity to work on side projects. I’ve been stuck with this idea can I build a Zero Trust architecture using only VMware’s currently available products?Īfter joining the Office of the CTO Global Field team, I started to explore this possibility. While BeyondCorp is all well-defined, and more and more vendors are supporting its architecture, I have been thinking about it from a different viewpoint.

The Idea of a VMware Based Zero Trust Architecture Which means that VPN is completely obsolete. In other words, you should allow access to your applications from any network, as long as you can verify that the device is corporate owned and managed. Your trust in this device should be high. If the device is corporate owned and thereby managed you can place policies on that device, make sure antivirus software is installed and up to date, make sure the hard drive is encrypted and so on. externally connected devices? You need to place your trust into something else. Knowing this, why have different access requirements and policies for internal vs. Security reports often state that many attacks originate from the internal network. The backdrop to BeyondCorp is that you can’t trust devices just because they are connected to your internal network. Reviewers: Cameron Haight – Vice President & Chief Technology Officer, Americas and Hadar Freehling – Staff Systems EngineerĮver since I read the Google’s BeyondCorp white papers many years ago, I’ve been thinking a lot about application protection, user experience, ease of management and trust in general. Author: Peter Bjork – Principal System Engineer Office of the CTO, Global Field
