David Hughes
๐ค SpeakerAppearances Over Time
Podcast Appearances
That's kind of the traditional way, any to any and then cutting back.
Zero trust is really starting from the other end of nothing can connect to anything and then adding rules to allow access.
So it's kind of an additive rather than subtractive approach.
Now, as you pointed out, it can be frustrating for users that want to do something new.
There may need to be a policy added for them to be able to do that.
But in terms of balancing the experience of the user with the safety of the user, I think people are realizing that in the current environment, it's much more tilted towards better to start with default deny, which is another word for zero trust.
There's always been the saying, defense in depth or multi-layer defense.
People need to be adopting all the technology they can versus putting all their eggs in one basket and thinking that there's one miracle cure.
But what I'd say is that for HPE networking, we are really focused on making sure our customers are able to use their network as part of an overall security solution, making sure that
security and networking are thought of together.
I think for many customers, they think of them as two separate things and they may be missing out a lot in terms of being able to use the network as a sensor and use the network as an enforcement point.