Zero Trust and Symantec

Security built on one simple premise: Trust no one.

One integrated platform to achieve Zero Trust: Integrated Cyber Defense.

Read the blog


Gartner Recommends Zero Trust Network Access to Address Expanding Attack Surface


Symantec Named a Leader in The Forrester Wave™: Zero Trust eXtended (ZTX) Ecosystem Providers, Q4 2018

The perimeter is dead: Long live the micro perimeter.

In the Cloud Generation, data is the core of security architecture. We can't rely on firewalls any longer, as your sensitive data is just as likely in transit back and forth to the cloud as it is sitting inside your perimeter.

In a Zero Trust model, you cannot trust anything in or out of your network: creating a new type of data-centric perimeter around information and protecting it with strong encryption techniques tied to intelligent authentication is the best security approach. Blindly allowing users to access the data without checking their identity negates the entire security stack.

Zero Trust implementation relies on protections that provide the most visibility into who is accessing your data, both on premises and in the cloud. Data should only be brought 'into the clear' when all risk factors surrounding the user and their authenticating device are evaluated.

Simply put: protect your data and trust no one. Symantec Zero Trust data solutions include:

  • Data Loss Prevention
  • Information Centric Security (ICS)
  • Encryption
  • Validation and ID Protection
  • Information Centric Tagging
  • Information Centric Analytics

Zero Trust Data


Segment, isolate, and control your network.

Your Zero Trust implementation needs strong network controls that segment and isolate data and resources. The modern network is a combination of on-premises, web-, and cloud-based systems, and protections need to be seamless, wherever your data flows.

Symantec Zero Trust Workload solutions include:

  • Secure Access Cloud
  • Cloud Workload Protection
  • Web Application Firewall
  • Cloud Access Security Broker
  • Control Compliance Suite
  • Symantec Protection Engine
Network Trust: How to protect your network. Learn more >

Zero Trust Network

People are your greatest asset. And your weakest link.

Your very best security meets the last line of defense with your users. Safeguarding your company with strong user authentication and strict access management is mission critical to the success of your Zero Trust ecosystem. Companies need to accurately control who gets what access, to which data, and when. They also need advanced technologies that protect them from the likes of phishing attacks and credential theft.

Your access control and authentication toolkit should include:

  • Secure Web Gateway solutions
  • Email Gateway
  • Cloud Access Security Broker
  • Web Isolation
  • Validation and ID Protection (VIP)
Workforce Trust: How to protect your identity and information. Learn more >

Zero Trust Workforce

Use Symantec's integrated technologies to protect your entire application stack.

Apply Zero Trust Workload principles to protect front-end and back-end systems that drive your daily business operations. Whether on premises or in the cloud, these connections, applications, and components are vulnerable threat vectors. Remember: if you're running workloads in a public cloud, your data is on somebody else's computer.

  • Secure Access Cloud
  • Cloud Workload Protection
  • Web Application Firewall
  • Cloud Access Security Broker
  • Control Compliance Suite
  • Symantec Protection Engine
Workload Trust: How to protect your entire application stack. Learn more >

Zero Trust Workloads

Every endpoint device needs protection in a connected world.

Your environment—everything you must defend against attack—extends to every device that touches your ecosystem. That includes both managed and unmanaged endpoints: mobile devices, tablets, and the like, as well as IoT devices (your pleasant-voiced household assistant...or smart toaster). An effective Zero Trust Security strategy means you must vet every device; ensure it is trustworthy; grant access; and then isolate, secure, and control every device touching the network at all times.

Symantec solutions to consider for Zero Trust Device security should include:

  • Symantec Endpoint Protection (SEP)
  • IoT
  • Cloud Workload Protection
  • Data Center Security
Device Trust: How to protect your endpoints. Learn more >

Zero Trust Devices

In the land of Zero Trust, visibility is key.

Threats come from anywhere and everywhere; attackers use ever-more sophisticated technologies such as hiding in encrypted traffic to evade detection. Visibility technologies stop them in their tracks, and aid in detection and response if you're already been exposed.

Symantec Zero Trust technologies include:

  • Security Analytics
  • Encrypted Traffic Management
  • Information Centric Analytics
  • Call Center Security
  • Endpoint Detection and Response
  • Cloud Access Security Broker 
  • User Behavior Analytics
Visibility and Analytics Trust: Increase visibility. Learn more >

Zero Trust Visibility and Analytics

Integrated solutions provide effective command and control.

When selecting a strategic partner with leading technologies, it's critical that they consider the benefits of simplicity and efficiency that can only be gained through integration, automation, and orchestration. This has been Symantec's entire strategic philosophy. We call it the Integrated Cyber Defense Platform (ICD). And we've led the effort to create an extended network of trusted cyber security partners with our Technology Integration Partner Program (TIPP), enabling seamless integration of security stacks, regardless of the vendor. 

Symantec Integrated Cyber Defense Platform. Learn more >

Partner Trust: Technologies that integrate with Symantec. Learn more >

Zero Trust Automation and Orchestration