Zero Trust Security
Zero Trust Security Model
Forrester Zero Trust eXtended (ZTX) Framework
To help you apply Zero Trust principles to your enterprise, Forrester developed the Zero Trust eXtended (ZTX) framework. This framework lists seven components where Zero Trust should fit in the enterprise.
How Guardicore Centra Aligns with the Forrester ZTX Framework
Data Security
Forrester’s ZTX framework helps you align to the principles of categorization, isolation and encryption.
Guardicore helps with:
- Zero-trust policy based on asset data classification
- Data breach detection
- API for data classification resources
- Violation alerts on data exfiltration, malware and ransomware
Workload Security
Forrester’s ZTX framework helps you align to a solution that secures your workloads to enable business operations.
Guardicore helps with:
- Policy control at speed and massive scale
- Workload security via network segmentation
- Process-level policy enforcement
- Workload security via deception, reputation and FIM
- Security follows the workload across any infrastructure
- Coverage across any infrastructure including hybrid and legacy systems
- Container security including visibility and enforcement
Network Security
Forrester’s ZTX framework helps you understand how to align to the principles of isolation, segmentation, and ultimately – security.
Guardicore helps with:
- Zero Trust whitelist-based segmentation
- Environment, application & tier segmentation
- Infrastructure-agnostic policy enforcement including legacy
- Process-level enforcement
- Context-based visibility
People
Forrester’s ZTX framework helps align your solution to the principle of ‘Never Trust, always verify’, to ensure that people access only what they’re entitled to and no more.
Guardicore helps with:
- Identity-based segmentation
- Maps provide full visibility into assets
- Visibility into laptops, desktops and VDI environments
- Context-based violations
- Remote access control using identity-based policies
- Lateral movement elimination based on reduced attack surface
Devices
Forrester’s ZTX framework helps you design a solution for securing the devices connected to and from your enterprise network.
Guardicore helps with:
- Fine-grained device segmentation
- Integrate with device visibility and control tools
- Alerting on unauthorized devices
- Isolation of suspicious devices
Automation & Orchestration
Forrester’s ZTX framework helps you understand how a solution can automate and orchestrate IT operations across the organization and have more control across heterogeneous systems.
Guardicore helps with:
Orchestration – Guardicore integrates with:
- Orchestration tools – Chef, Puppet, Ansible
- Container orchestration – Kubernetes, Docker
- Public cloud APIs: Azure, AWS, Oracle, GCP
Automation
Automated response, such as machine quarantine or specific flow blocking when a threat is detected
Threat Intelligence feeds
- Threat intelligence feed curated from various sources – commercial, developed in-house and user provided. Visit our
Cyber Threat Intelligence Feed.
Visibility & Analytics
Forrester’s ZTX framework helps you understand the importance of useful analytics to a Zero Trust-based solution and helps eliminate blind spots of systems and infrastructure.
Guardicore helps with:
- Process-level visibility into user environments and applications
- Deep investigation of each individual flow with full context including process, user, hash, cmd line, PID and more
- Visibility of traffic to/from both managed and unknown assets
- Deep forensic analysis and incident response
- Directly from map: Allow or block specific flows or classify assets to apply different security policies i.e. “quarantine” or “prevent non-admin RDP access”
- Simplified auditing
Manageability & Usability
Forrester’s ZTX framework guides you through the manageability and ease-of use aspects on the way to achieve Zero Trust.
- Achieve Zero Trust segmentation within hours
- A single, highly-consolidated UI into Guardicore Centra’s main functions: maps, incidents and policy creation wizards
- Overlay solution with no networking or infrastructure changes required
- Apply fast, Zero Trust segmentation to legacy and hybrid systems
- Integration with firewall management tools
APIs
Forrester’s ZTX framework helps you understand how to use APIs to create policies to secure the workloads across your enterprise.
Guardicore helps with:
REST API for all common functions
- Create policies based on observed traffic
- Automate workload classification importing
- Export aggregated data for various reports
- Extensive REST API documentation and Python SDK enable users to rapidly automate custom tasks
*More than 25% of Guardicore customers use tools that leverage Guardicore’s REST API.
Data Security
Forrester’s ZTX framework helps you align to the principles of categorization, isolation and encryption.
Guardicore helps with:
- Zero-trust policy based on asset data classification
- Data breach detection
- API for data classification resources
- Violation alerts on data exfiltration, malware and ransomware
Workload Security
Forrester’s ZTX framework helps you align to a solution that secures your workloads to enable business operations.
Guardicore helps with:
- Policy control at speed and massive scale
- Workload security via network segmentation
- Process-level policy enforcement
- Workload security via deception, reputation and FIM
- Security follows the workload across any infrastructure
- Coverage across any infrastructure including hybrid and legacy systems
- Container security including visibility and enforcement
Network Security
Forrester’s ZTX framework helps you understand how to align to the principles of isolation, segmentation, and ultimately – security.
Guardicore helps with:
- Zero Trust whitelist-based segmentation
- Environment, application & tier segmentation
- Infrastructure-agnostic policy enforcement including legacy
- Process-level enforcement
- Context-based visibility
Network Security
Forrester’s ZTX framework helps you understand how to align to the principles of isolation, segmentation, and ultimately – security.
Guardicore helps with:
- Zero Trust whitelist-based segmentation
- Environment, application & tier segmentation
- Infrastructure-agnostic policy enforcement including legacy
- Process-level enforcement
- Context-based visibility
Devices
Forrester’s ZTX framework helps you design a solution for securing the devices connected to and from your enterprise network.
Guardicore helps with:
- Fine-grained device segmentation
- Integrate with device visibility and control tools
- Alerting on unauthorized devices
- Isolation of suspicious devices
Automation & Orchestration
Forrester’s ZTX framework helps you understand how a solution can automate and orchestrate IT operations across the organization and have more control across heterogeneous systems.
Guardicore helps with:
Orchestration – Guardicore integrates with:
- Orchestration tools – Chef, Puppet, Ansible
- Container orchestration – Kubernetes, Docker
- Public cloud APIs: Azure, AWS, Oracle, GCP
Automation
Automated response, such as machine quarantine or specific flow blocking when a threat is detected
Threat Intelligence feeds
- Threat intelligence feed curated from various sources – commercial, developed in-house and user provided. Visit our
Cyber Threat Intelligence Feed.
Visibility & Analytics
Forrester’s ZTX framework helps you understand the importance of useful analytics to a Zero Trust-based solution and helps eliminate blind spots of systems and infrastructure.
Guardicore helps with:
- Process-level visibility into user environments and applications
- Deep investigation of each individual flow with full context including process, user, hash, cmd line, PID and more
- Visibility of traffic to/from both managed and unknown assets
- Deep forensic analysis and incident response
- Directly from map: Allow or block specific flows or classify assets to apply different security policies i.e. “quarantine” or “prevent non-admin RDP access”
- Simplified auditing
Manageability & Usability
Forrester’s ZTX framework guides you through the manageability and ease-of use aspects on the way to achieve Zero Trust.
- Achieve Zero Trust segmentation within hours
- A single, highly-consolidated UI into Guardicore Centra’s main functions: maps, incidents and policy creation wizards
- Overlay solution with no networking or infrastructure changes required
- Apply fast, Zero Trust segmentation to legacy and hybrid systems
- Integration with firewall management tools
APIs
Forrester’s ZTX framework helps you understand how to use APIs to create policies to secure the workloads across your enterprise.
Guardicore helps with:
REST API for all common functions
- Create policies based on observed traffic
- Automate workload classification importing
- Export aggregated data for various reports
- Extensive REST API documentation and Python SDK enable users to rapidly automate custom tasks
*More than 25% of Guardicore customers use tools that leverage Guardicore’s REST API.
Accelerate Zero Trust adoption with faster and easier segmentation
Classify workloads and data
Learn More
Prevent lateral movement
Learn More
Simplify and accelerate compliance
Learn More
Familiar with
Zero Trust Security?
New to
Zero Trust Security?
Assess Your Zero Trust Security Posture with Guardicore Infection Monkey and Centra™
“We were moving to another data center. We needed to complete it in 30 days. However, the technology teams would not have the necessary time to map all the existing firewall rules.
We had environment segregation based on the firewall, but when moving to the new environment, we would have none of that because time wouldn’t allow it.
Now we’re in the process of refining the rules, not only making sure that the rules are working correctly.
Today, I can trust nothing. I cannot trust my mobile phone on my network, I can’t trust my third-party that comes with his notebook and connects to my network, I can’t trust the notebook that my employee takes home and so on. so, it’s a matter of Zero Trust.
Guardicore’s technical team is helping us, but it is much simpler when everything is working with a few simple clicks.”
Alex Amorim
Information Security Manager, Cogna Group