Select the security approaches to protect against threats
- Endpoint and client devices (on-network, off-network, and remote)
- Identity such as MFA, passwordless, continuous trust, and identity intelligence
- Email (phishing, ransomware, business email compromise, malware, and spoofing)
Modify the security architecture to address technical requirements
- Hybrid workers
- IoT
- SaaS
- Applications across data center and multi-cloud
- Select a VPN and tunneling solution such as SD-WAN, IPsec, MPLS, GRE, DMVPN, and public cloud tunnel options based on business and technical requirements
- Select the approach to secure the infrastructure management and control planes
- Select the firewall feature or architecture such as traditional firewall, Nextgen firewall,Web Application Firewall, IPS/IDS, distributed firewall, eBPF, and host-based firewallgiven business and technical requirements