<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic What is Zero Trust Security? And why should you Care? in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/What-is-Zero-Trust-Security-And-why-should-you-Care/m-p/59245#M11956</link>
    <description>&lt;P&gt;&lt;STRONG&gt;Across the industry, security professionals are designing and rebuilding their strategies around a Zero Trust approach, one that trusts no user, device or system, neither inside nor outside the perimeter.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;Read this article, the first of our Zero Trust blog series, to learn more about the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/EM&gt;&lt;/STRONG&gt;&lt;STRONG&gt;&lt;EM&gt;approach, the reasons for its adoption, and how you can practically implement it using Check Point Infinity.&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;&lt;A href="https://blog.checkpoint.com/2019/07/24/what-is-zero-trust-security-and-why-should-you-care/" target="_blank"&gt;https://blog.checkpoint.com/2019/07/24/what-is-zero-trust-security-and-why-should-you-care/&lt;/A&gt;&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 30 Jul 2019 13:41:32 GMT</pubDate>
    <dc:creator>danakatz</dc:creator>
    <dc:date>2019-07-30T13:41:32Z</dc:date>
    <item>
      <title>What is Zero Trust Security? And why should you Care?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/What-is-Zero-Trust-Security-And-why-should-you-Care/m-p/59245#M11956</link>
      <description>&lt;P&gt;&lt;STRONG&gt;Across the industry, security professionals are designing and rebuilding their strategies around a Zero Trust approach, one that trusts no user, device or system, neither inside nor outside the perimeter.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;Read this article, the first of our Zero Trust blog series, to learn more about the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/EM&gt;&lt;/STRONG&gt;&lt;STRONG&gt;&lt;EM&gt;approach, the reasons for its adoption, and how you can practically implement it using Check Point Infinity.&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;&lt;A href="https://blog.checkpoint.com/2019/07/24/what-is-zero-trust-security-and-why-should-you-care/" target="_blank"&gt;https://blog.checkpoint.com/2019/07/24/what-is-zero-trust-security-and-why-should-you-care/&lt;/A&gt;&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 30 Jul 2019 13:41:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/What-is-Zero-Trust-Security-And-why-should-you-Care/m-p/59245#M11956</guid>
      <dc:creator>danakatz</dc:creator>
      <dc:date>2019-07-30T13:41:32Z</dc:date>
    </item>
  </channel>
</rss>

