Skip to content
ON2IT
  • Zero Trust
  • Managed Security
  • John Kindervag
  • Resources
    • John Kindervag
    • All resources
      • Guides & Papers
      • Data sheets
    • Blog
  • Login
  • NL

Trends and Reports

Lessons learned from over sixty years of combined Zero Trust implementation

June 3, 2022April 20, 2022

Biden’s Zero Trust advice, as well as the Dutch NCSC advice, has put Zero Trust on the map more than it has ever been before. But what exactly is Zero Trust? And how has it developed since John Kindervag popularized the term?

Read more

Authors

John Kindervag

John Kindervag
Senior VP Cybersecurity

Yuri Bobbert
Global CISO

Lieuwe Jan Koning
CTO

Rob Maas
Lead Architect

Johan Bogema
Product Owner Cloud Security

ON2IT

Contact
About us
Press releases
Media coverage

Prevention

Zero Trust as a Service
AUXO™
mSOC™

Resources

John Kindervag
Guides & Papers
Datasheets
Video
Blog

Managed Cyber Security

Controls Management
Protect Surface Management
Event Management
Incident Management
Improvement Management
Compliance Management

Social media

LinkedIn Twitter YouTube
Copyright © ON2IT · Privacy & Cookie policy · Responsible disclosure
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
.
Cookie SettingsAccept
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT
Schedule a talk with John Kindervag

Interested in a live interactive Q&A with John, scheduled for a limited group? Please fill in the form below. We’ll make sure to send you the details by email.

Name(Required)
To which question do you hope to get an answer during the webinar?

 

Join our cybersecurity newsletter

Stay up to date on the latest cybersecurity news and trends.

The John Kindervag Newsletter

Stay up to date on John’s articles, papers and appearances.

Zero Trust Dictionary

Download the Zero Trust Dictionary by Zero Trust creator John Kindervag.

We will treat all your data confidentially (see our privacy statement).
This field is for validation purposes and should be left unchanged.
Authentic Zero Trust Guide

Download the Authentic Zero Trust Guide by Zero Trust founder John Kindervag.

We will treat all your data confidentially (see our privacy statement).
This field is for validation purposes and should be left unchanged.
How a Zero Trust strategy prevents data breaches using unknown threats

In light of the Log4j vulnerability, the question “how do we protect our organization from unknown threats” is increasingly being asked.

Do you engage in the race with hackers? How do you deal with the by definition unknown attack surface that is growing daily? In this article, we explain how a Zero Trust strategy can provide a solution.

We will treat all your data confidentially (see our privacy statement).
This field is for validation purposes and should be left unchanged.
A hands-on approach to Zero Trust implementations
We will treat all your data confidentially (see our privacy statement).
Request your AUXO demo

Experience how AUXO provides real insight into the cybersecurity health of your organization.

Name(Required)
Request your Zero Trust as a Service demo

Experience how Zero Trust as a Service care of the security process so you can focus on what is really important: managing your business and realizing growth.

Name(Required)
Request a Zero Trust Readiness Assessment
Name(Required)