**TRUST BUT VERIFY **has been one of the primary principles of IT security for many years. With traditional perimeter-based and endpoint security, enterprises followed the trust but verify path through a number of proven practices:
- Protect the ingress and egress from the network
- Define and group devices and users into subnets/VLANs using a specific set of usually static rules
- Use authentication mechanisms centered around users
- Install agents to detect and prevent malware
- But today, these methods, though still necessary, are no longer enough to protect against the threats posed by unmanaged devices, credential misuse, IoT devices, wrong configuration, insider mal-intent, and lateral movement of threats, once they enter the system.
- Moreover, while existing endpoint security, network security, cloud security, and data loss prevention (DLP) solutions may work well to protect traditional IT infrastructure, they are completely outclassed and outmaneuvered by new security challenges — more specifically, the security challenges posed by smart business devices such as IP-based cameras, smart TVs, set-top boxes, and smart thermostats.