Critical Infrastructure Security , Events , Governance & Risk Management

How to Distinguish True Zero Trust From Imposters

Zscaler CEO Jay Chaudhry on Why Firewalls and VPN Don't Belong in Zero Trust Design
Jay Chaudhry, founder, chairman and CEO, Zscaler

There's a lot of confusion in the market around what constitutes zero trust architecture, and Zscaler founder, Chairman and CEO Jay Chaudhry believes firewalls and VPNs shouldn't be part of a system that's supposed to not trust anybody or anything by default.

See Also: Visibility Into Distributed Cloud Environments

In a video interview with Information Security Media Group at RSA Conference 2022, Chaudhry also discusses:

  • How next-gen zero trust can be distinguish from legacy systems;
  • Why firewalls and VPNs don't belong in zero trust designs;
  • Opportunities to deliver zero trust to U.S. government agencies.

Chaudhry is an accomplished entrepreneur, having founded a series of successful companies, including AirDefense, CipherTrust, CoreHarbor, SecureIT, and Zscaler, which went public on March 16, 2018. He has a history of introducing visionary innovations to market that address the demand for securely enabling emerging technology trends. Chaudhry's considerable work in the security technology sector has made him a trusted adviser for many enterprise CIOs and CISOs. He has more than 25 years of security industry expertise, including engineering, sales, marketing and management experience with leading organizations, such as IBM, NCR and Unisys.


About the Author

Michael Novinson

Michael Novinson

Managing Editor, Business, ISMG

Novinson is responsible for covering the vendor and technology landscape. Prior to joining ISMG, he spent four and a half years covering all the major cybersecurity vendors at CRN, with a focus on their programs and offerings for IT service providers. He was recognized for his breaking news coverage of the August 2019 coordinated ransomware attack against local governments in Texas as well as for his continued reporting around the SolarWinds hack in late 2020 and early 2021.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.