Program



Track C
2024.10.16 14:40 ~ 15:20
mail share facebook share twitter share linkedin share band share kakao
An approach to implementing zero trust from the network level using security switch

PIOLINK

Seok Sangchan, Department Manager


The traditional network sets physical boundaries and controls access for users and resources. However, as digital transformation accelerates, the network boundaries expand and the location of enterprise resources diversifies, this has brought attention to zero trust, which requires verification for all users, devices, and applications, regardless of the network boundary.

The zero trust approach demands strict, dynamic access control to resources, as resources can exist anywhere. TiFRONT ZT is a zero trust architecture that uses L2 security switches to logically microsegment users based on organizational structure, regardless of the physical boundaries of users and resources, and controls access to resources according to policies for each segment. Additionally, TiFRONT ZT protects the internal network by detecting and blocking abnormal behavior in real-time through a security engine embedded in the security switch, and it can expand the security domain by integrating with various pillars of zero trust.