White Paper
Zero Trust Evaluation Guide
Zero T rust Evaluation Guide For the WorkforceCONTENTS WHY ZERO TRUST? 1 ZERO TRUST: FOR THE WORKFORCE 5 ESTABLISH USER TRUST 7 GAIN VISIBILITY INTO DEVICES 9 ESTABLISH DEVICE TRUST 12 ENFORCE ADAPTIVE POLICIES 15 ENABLE SECURE ACCESS TO ALL APPS 18 DUO’S ZERO TRUST FOR THE WORKFORCE 21 DUO BEYOND & CISCO TRUSTED ACCESS 27 © 2019 Duo Security, Inc.Introduction User Trust Device Visibility Adaptive Policies Access to All Apps Device Trust Duo’s Zero Trust 2 The perimeter has expanded beyond enterprise walls, making it more difficult for security and IT teams to verify user identities, and the trustworthiness of their devices, before granting both access to enterprise applications and data. The new workforce model today requires an equally extended security model. The extended pe