Cybersecurity In-Depth: Getting answers to questions about IT security threats and best practices from trusted cybersecurity professionals and industry experts.

Unlike traditional security approaches, the zero-trust security model verifies a user's identity each and every time they need specific system access.

Ash Devata, General Manager, Cisco Zero Trust and Duo Security

November 4, 2021

1 Min Read
phone and a laptop, showing all the services accessible

Question: How does zero trust differ from a traditional security approach?

Ash Devata, general manager, Cisco Zero Trust and Duo Security: Traditional security gives value to where the user is coming from. It uses a lot of trust because the user's location or IP address (perimeter model) is used to define the user to the system. In a zero-trust model, we assume zero units of trust before we grant you access to anything and verify a lot of other information before granting access. And when access is granted, you’ll be given the least amount of privilege necessary to get your job done.

A good example of a traditional security approach is if you’re in the office, you can access the full network even though you only need access to a specific portal. Or imagine getting into a multifloor club; in a traditional security approach, the bouncer checks your ID and you can go anywhere. But in a zero-trust approach, getting into the club is only the first check. The bartender or waitress must also check your ID before you could be served regardless of where you are in the club.

About the Author(s)

Ash Devata

General Manager, Cisco Zero Trust and Duo Security

Ash Devata is General Manager of Cisco Zero Trust, the most comprehensive platform to secure access for any user, from any device, to any IT application or environment. Ash leads product strategy, engineering, design, and operations functions for Zero Trust products within Cisco’s broader security portfolio, including the Duo business.

Prior to taking the helm of Cisco Zero Trust, Ash led product and go-to-market strategy for Duo, where he helped it grow into a worldwide business with more than 30,000 customers. Before Duo, Ash managed the enterprise solutions portfolio at RSA.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights