La confianza cero representa una revolución en cuanto a la manera de proteger los datos, conectar a las personas y acceder a las herramientas. Pero, ¿cómo hemos llegado hasta aquí? ¿Qué puntos débiles de la seguridad de la red heredada han contribuido a que la noción de una arquitectura de confianza cero adquiera importancia?
Este informe técnico analiza más de dos décadas de historia de confianza cero, comenzando antes de que tuviera un nombre, para mostrarle no solo de dónde procede, sino qué recorrido ha hecho desde entonces. Lea hoy “Una breve historia de la confianza cero” para conocer:
Lea el informe hoy.
*Required fields
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |