
Tanium: The company’s Tanium Endpoint Identity will provide monitoring of endpoint devices in real time to make sure any connected devices are both secure and up-to-date. Jamf: Google Cloud and BeyondCorp customers will now be able to use Jamf to ensure that only trusted devices with approved apps can access internal data. CrowdStrike: BeyondCorp will leverage CrowdStrike’s endpoint detection system to reduce a company’s risk of external intrusions. Employees using their personal devices will be able to access the applications without a VPN. Citrix: Applications being delivered via Citrix Workspace will now be able to use BeyondCorp’s access controls and policy enforcement. Those previous partners include Check Point, Lookout, Palo Alto Networks, Symantec, and VMware. To that end, the company had previously created an alliance of partners that it is now expanding with the goal of offering a suite of products that work together to ease zero trust adoption and implementation. In the blog post, Srinivas said more work needed to be done on zero trust to “democratize this technology, accelerate and ease its adoption to help organizations stay secure, agile, and productive.” The system replaces a VPN, which can be surprisingly difficult to set up and use, with a system that automates the authentication by placing certificates on devices and then matching them to a secure database.īut that was just a first step.
Typically, such verification for external users was managed by a VPN.Įarlier this year, Google released BeyondCorp Remote Access, a cloud-based security product based on a system that Google originally built for internal use almost a decade ago. With zero trust security, no user is trusted by default, whether they enter a network internally or externally.
But as Srinivas notes, the pandemic and the acceleration of trends like work from home and distributed teams has added a new layer of urgency to this security restructuring. The continued adoption of cloud computing has already been driving companies to rethink how they approach security.