Statements (30)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:software
|
gptkbp:bfsLayer |
4
|
gptkbp:bfsParent |
gptkb:Zscaler
|
gptkbp:aims_to |
data breaches
|
gptkbp:applies_to |
remote work environments
Io T security |
gptkbp:based_on |
the principle of least privilege
|
gptkbp:emphasizes |
never trust, always verify
|
gptkbp:enhances |
regulatory compliance
incident response times |
https://www.w3.org/2000/01/rdf-schema#label |
Zero Trust
|
gptkbp:involves |
continuous monitoring
|
gptkbp:is_adopted_by |
large enterprises
|
gptkbp:is_characterized_by |
dynamic access controls
|
gptkbp:is_designed_to |
protect data and resources
|
gptkbp:is_implemented_in |
multi-factor authentication
security policies and technologies |
gptkbp:is_influenced_by |
the rise of mobile devices
|
gptkbp:is_integrated_with |
security information and event management (SIEM) systems
|
gptkbp:is_often_depicted_as |
traditional perimeter security
|
gptkbp:is_often_used_in |
cloud security
|
gptkbp:is_part_of |
modern cybersecurity strategies
|
gptkbp:is_supported_by |
identity and access management solutions
cloud access security brokers (CAS Bs) |
gptkbp:reduces |
attack surface
|
gptkbp:requires |
authentication for every access request
real-time visibility into network traffic user education and training |
gptkbp:utilizes |
micro-segmentation
|
gptkbp:was_a_response_to |
increasing cyber threats
|