GovWhitePapers Logo

Sorry, your browser is not compatible with this application. Please use the latest version of Google Chrome, Mozilla Firefox, Microsoft Edge or Safari.

Application Security Framework for Zero Trust

In order for the adaptive security infrastructure in your environment to be effective, edge security controls need to move beyond prescriptive risk policies and leverage deeper request context and behavior analysis. As best practices suggest, using a hybrid approach where prescriptive access policies are enforced by default but are given less weight individually as behavioral information for a specific user is the most effective. To accommodate diverse scenarios, organizations typically require a mix of strong and passive authentication methods. This enables you to apply the best fit based on the specific need and the associated risk (i.e., how sensitive the information is and the context of the request).

Micro Focus welcomes the opportunity to join your zero trust team and help you expedite a smooth transition to ZTA, meet existing mandate deadlines, and apply more effective security operations.

  • Author(s):
  • Micro Focus Government Solutions
  • Share this:
  • Share on Facebook
  • Share on Twitter
  • Share via Email
  • Share on LinkedIn
Application Security Framework for Zero Trust
Format:
  • White Paper
Topics:
Website:Visit Publisher Website
Publisher:Micro Focus Government Solutions
Published:March 8, 2022
License:Copyrighted
Copyright:© 2022. Micro Focus. All Rights Reserved.

Featured Content

Contact Publisher

Claim Content