How to Apply Zero-Trust Principles to Strengthen Endpoint Security by Gartner®

Research Report
"Zero trust is a security paradigm that replaces implicit trust with explicit trust by continuously assessing risk and trust levels, based on identity and context."
Gartner report cover offering guidance on applying zero trust models, emphasizing the foundational role of cybersecurity solutions in segmented network defense.

How to Apply Zero-Trust Principles to Strengthen Endpoint Security by Gartner®

How to Apply Zero-Trust Principles to Strengthen Endpoint Security

In modern workplace environments, endpoints are more exposed to threats and become a larger attack surface, which increases security risk levels for organizations. Security and risk management leaders can use this research to extend zero-trust principles to endpoints and enhance workspace security.

Key Highlights:

To reduce this increased threat exposure and implicit trust on endpoints in modern work environments, security and risk management (SRM) leaders responsible for endpoint security should:

  • Extend zero-trust principles to endpoints that access corporate resources by removing implicit trust
  • Continuously verify the device, user, configuration and identity permissions to reduce the overall attack surface
  • Provide limited access to resources securely on unmanaged devices by using technologies such as enterprise browsers and virtual desktop infrastructure(VDI)/desktop as a service (DaaS)

This research focuses on how to apply the zero-trust principles using various endpoint security and management technologies and tools. Use the three steps in Figure 1 to implement zero-trust principles on endpoint devices.​

GARTNER and associated reports are registered trademarks of Gartner, Inc. and/or its affiliates in the U.S. and internationally and is used herein with permission. All rights reserved.

In modern workplace environments, endpoints are more exposed to threats and become a larger attack surface, which increases security risk levels for organizations. Security and risk management leaders can use this research to extend zero-trust principles to endpoints and enhance workspace security.
Deepak Mishra, Jon Amato and Nikul Patel, Gartner Analysts, Gartner
View the Research Report

How to Apply Zero-Trust Principles to Strengthen Endpoint Security by Gartner®

"Zero trust is a security paradigm that replaces implicit trust with explicit trust by continuously assessing risk and trust levels, based on identity and context."

How to Apply Zero-Trust Principles to Strengthen Endpoint Security

In modern workplace environments, endpoints are more exposed to threats and become a larger attack surface, which increases security risk levels for organizations. Security and risk management leaders can use this research to extend zero-trust principles to endpoints and enhance workspace security.

Key Highlights:

To reduce this increased threat exposure and implicit trust on endpoints in modern work environments, security and risk management (SRM) leaders responsible for endpoint security should:

  • Extend zero-trust principles to endpoints that access corporate resources by removing implicit trust
  • Continuously verify the device, user, configuration and identity permissions to reduce the overall attack surface
  • Provide limited access to resources securely on unmanaged devices by using technologies such as enterprise browsers and virtual desktop infrastructure(VDI)/desktop as a service (DaaS)

This research focuses on how to apply the zero-trust principles using various endpoint security and management technologies and tools. Use the three steps in Figure 1 to implement zero-trust principles on endpoint devices.​

GARTNER and associated reports are registered trademarks of Gartner, Inc. and/or its affiliates in the U.S. and internationally and is used herein with permission. All rights reserved.

The Absolute Platform

主なメリットやカテゴリーを強調する

機能または利点の簡単な説明または概要を記入してください。なぜ価値があるのか、どのようにユーザーに役立つのかを説明してください。

Other foundational components of the Absolute Platform that enable the Absolute Secure Endpoint™ and Secure Access™ products are as follows:

  • Web console
  • Mobile app
  • Rules and policy engine
  • Alerts
  • Dashboards
  • APIs
  • Application Persistence-as-a-Service SDK
  • Third-party integrations (e.g., SIEM, ITSM)