
Google knew of the traditional domain blindspots early in the cloud era and realized then that a different approach to security was needed. This shift in approach encompasses cloud resources that the traditional domain model struggles to cover, and significantly reduces the blind spots for cyber attacks to enter the network. In order for security to account for the wide variety of endpoints emerging in the cloud, Zero Trust Security recognizes that all network traffic and users simply can’t be trusted. With burgeoning cloud infrastructure, web applications, macOS ® and Linux ® systems, cloud and physical file servers, WiFi, and more, the IT network has dramatically changed and moved away from the traditional perimeter-based, Windows ® domain model.

Presented as a revolutionary security model back in 2009, Zero Trust Security has since been widely adopted as a significant upgrade over the traditional domain model.

The concept of Zero Trust Security is quite important in today’s modern cloud era.

Before diving into the benefits, let’s first understand what exactly a Zero Trust Security model entails, why Google is so excited about it, and how you can potentially leverage it in your own organization. According to Google ®, “BeyondCorp is a security model that builds upon seven years of building zero trust networks at Google.” But, what exactly are the benefits of a BeyondCorp implementation based on a Zero Trust Model? Well, as the creator of the BeyondCorp security model implementation, and by extension a pioneer in Zero Trust Security, Google believes there are a number of them.
