Skip to content
11:11 Systems
The Resilient Cloud Platform
11:11 Systems11:11 Systems
  • Why 11:11
    • Submenu
      • Column 1
        • 11:11 Systems Consulting
          Consulting Services
          Global Regions
          Cloud Regions
          11:11 Systems Security
          Security

      • Column 2
        • Cloud Console
          Cloud Console
          Catalyst
          Planning and Assessment
          Compliance
          Compliance

      • WHY CHOOSE 11:11
      • Overview
      • Leadership
      • News & Media
      • ESG Program
      •  
      • Careers
      • Technology Partners
      • Customer Stories
      • Innovation Blog
  • Products & Services
    • Products & Services

        • Cloud Overview
        • Managed Public Cloud
        • Private Cloud
        • Object Storage
        • Cloud Labs
        • Flexible Cloud Environment/Colocation
        • AWS Solutions
        • Managed OS Services
        • Managed DB Services

        Infrastructure as a Service

        Take a 30-day free trial of 11:11 Cloud.

        Cloud hosting built for your business.
        START FREE TRIAL
        REQUEST A QUOTE

        • Backup Overview
        • Veeam Backup
        • Microsoft 365 Backup
        • Managed Backup for Cohesity
        • Cyber Vault
        • Data Protection Services
        Backup as a Service

        11:11 Cloud Backup

        Protect your data wherever it lives.
        REQUEST A QUOTE
        REQUEST A DEMO

        • DRaaS Overview
        • DRaaS for Veeam
        • DRaaS for Zerto
        • DRaaS for Azure
        • DRaaS for Cohesity
        • Managed Recovery
        • Cloud Recovery
        • Cyber Recovery Platform
        • Infrastructure Recovery
        • Continuity Consulting Services
        • Disaster Recovery Consulting
        Disaster Recovery

        5TB 30Day Free Trial of DRaaS for Veeam

        Protect your business-critical workloads and reduce recovery time with the Leader in Disaster Recovery.
        START FREE TRIAL
        LEARN MORE

        • Security Overview
        • Continuous Risk Scanning
        • Managed Detection and Response
        • Managed SIEM
        • Managed EDR
        • Managed Firewall
        • Application and Zero Trust Services
        Security Services

        Take the first steps toward cyber resilience.

        Download our white paper and learn how to stay ahead of threats.
        REQUEST A QUOTE
        DOWNLOAD NOW

        • Networking Overview
        • SD-WAN
        • Managed Connectivity for AWS Direct Connect
        • Multi-Cloud Connect
        • Network Consulting Services
        Connectivity Services

        Transform your network.

        Take your infrastructure and performance to the next level.
        REQUEST A QUOTE
        WATCH VIDEO
  • Solutions
    • Solutions Submenu
      • INDUSTRY
      • Education
      • Financial
      • Government
      • Healthcare
    • Solutions Business Objective Submenu
      • BUSINESS OBJECTIVE
      • Cyber Resilience
      • Modernize
      • Protect
  • Partners
    • Partners Submenu
      • Overview
      • Become a Partner
      • Partner Portals
  • Resources
    • Resources Submenu
      • Events
      • Webinars
      • News & Media
      • White Papers
      • Podcast
      • Data Sheets
      • Customer Stories
      • Innovation Blog
  • Support
    • Support Submenu
      • Contact Support
      • Product Documentation
      • API Documentation
Search:
  • Login
  • Contact
Header Right Menu
Free Trial
  • Why 11:11
    • Consulting Services
    • Cloud Console
    • Cloud Regions
    • Planning and Assessment
    • Security
    • Compliance
    • WHY CHOOSE 11:11
    • Overview
    • Leadership
    • News & Media
    • ESG Program
    • Careers
    • Technology Partners
    • Customer Stories
    • Blog
  • Products & Services
    • CLOUD
    • Cloud Overview
    • Managed Public Cloud
    • Private Cloud
    • Object Storage
    • Cloud Labs
    • Flexible Cloud Environment/Colocation
    • AWS Solutions
    • Managed OS Services
    • Managed DB Services
    • BACKUP
    • Backup Overview
    • Veeam Backup
    • Microsoft 365 Backup
    • Managed Backup for Cohesity
    • Cyber Vault
    • Data Protection Services
    • DISASTER RECOVERY
    • DRaaS Overview
    • DRaaS for Veeam
    • DRaaS for Zerto
    • DRaaS for Azure
    • DRaaS for Cohesity
    • Managed Recovery
    • Cloud Recovery
    • Cyber Recovery Platform
    • Infrastructure Recovery Services
    • Continuity Consulting
    • Disaster Recovery Consulting
    • SECURITY
    • Security Overview
    • Continuous Risk Scanning
    • Managed Detection and Response
    • Managed SIEM
    • Managed EDR
    • Managed Firewall
    • Application and Zero Trust Services
    • NETWORK
    • Network Overview
    • SD-WAN
    • Managed Connectivity for AWS Direct Connect
    • Multi Cloud Connect
    • Managed IP
  • Solutions
    • INDUSTRY
    • Education
    • Financial
    • Government
    • Healthcare
    • BUSINESS OBJECTIVE
    • Cyber Resilience
    • Modernize
    • Protect
  • Partners
    • Overview
    • Become a Partner
    • Partner Portals
  • Resources
    • Events
    • Webinars
    • News & Media
    • Whitepapers
    • Podcast
    • Datasheets
    • Customer Stories
    • Innovation Blog
  • Support
    • Contact Support
    • Product Documentation
    • API Documentation
  • Contact
  • Login
  • Free Trial
Tags: Zero Trust ArchitectureZero Trust Securityzero trustCloud ComputingBackup and disaster recoveryFirewallThe NIST CyberSecurity FrameworkCloudConnectivityCybercrimeManaged Security Servicescyber threatsCloud BackupData ProtectionCloud Services
Author: Brandon Leiker
Date: February 12, 2024

What is Zero Trust Security and Why do I Need it?

Modern technology environments have become increasingly complex. This, as you might imagine, has had a wide-ranging impact on our organizations, IT teams, and priorities, especially when it comes to security.

 

The proliferation of cloud services, Internet of Things (IoT) devices, and the shift to mobile and remote work has eliminated the traditional corporate security perimeter. As a result, organizations can no longer rely on the “castle-and-moat” model as a basis for an effective security strategy. That model relied on the notion that an organization’s network had a clearly identified security perimeter to establish a trust boundary. By default, users and devices within the trust boundary were implicitly trusted and allowed access to any organizational resources, while anything external was considered untrustworthy, requiring authentication to gain access.

 

Zero Trust is a security strategy intended to overcome the challenges posed by the modern technology environment. The primary concept of Zero Trust is that users and devices should not be trusted implicitly, even if they are connected to a private internal network controlled by the organization. Instead, access is based on the principle of “never trust, always verify,” where identity and permissions are continuously re-verified. Zero Trust doesn’t have to be all or nothing, organizations can roll it out in steps and phases to address individual use cases and goals.

 

“Zero trust operates on the assumption that threats can lurk anywhere (even within your organization). Therefore, every user, device, and network flow is treated as potentially compromised and must be verified and vetted before granting access.”

– Justin Giardina, Chief Technology Officer, 11:11 Systems

 

The term “Zero Trust” was introduced in 2010 by Forrester Analyst John Kindervag in the white paper, “No More Chewy Centers: The Zero Trust Model Of Information Security.” To facilitate the ability for enterprises to adopt a Zero Trust architecture, the National Institute of Standards and Technology (NIST) released Special Publication (SP) 800-207 in 2020, which provided further guidance regarding Zero Trust concepts, use cases, logical components, and deployment models.

 

Fundamentally, Zero Trust is based on three core principles:

    • Assume breach — Organizations should assume there is a malicious presence inside their environment at all times and implement security controls to minimize its impact. This means that all access should be performed securely and use end-to-end encryption, segmentation should be used to minimize access, and all activity should be logged.
    • Least privilege — Verified users and devices should be granted the minimum permissions necessary to perform their function for the shortest amount of time possible.
    • Explicit verification — Authenticate and authorize based on all data points available, including user or device identity, device health, data sensitivity, location, and anomalies.

 

In SP 800-207, NIST outlined seven core tenets to assist organizations with the practical application of a Zero Trust architecture:

    1. All data sources and computing services are considered resources.
    2. All communication is secured regardless of network location.
    3. Access to individual enterprise resources is granted on a per-session basis.
    4. Access to resources is determined by dynamic policy—including the observable state of client identity, application/service, and the requesting asset—and may include other behavioral and environmental attributes.
    5. The enterprise monitors and measures the integrity and security posture of all owned and associated assets.
    6. All resource authentication and authorization are dynamic and strictly enforced before access is allowed.
    7. The enterprise collects as much information as possible about the current state of assets, network infrastructure, and communications, and uses it to improve its security posture.

 

Organizations today face a vast number of risks, whether from unwitting or malicious insiders, motivated ransomware gangs and cybercriminals, or nation states. In our experience, organizations can mitigate these risks by adopting and implementing a Zero Trust architecture.  In a recent 11:11 Systems blog post Justin Giardina, Chief Technology Officer, said “Zero trust operates on the assumption that threats can lurk anywhere (even within your own organization). Therefore, every user, device and network flow is treated as potentially compromised and must be verified and vetted before granting access.”  While this may seem extreme in today’s cyber-risk climate it really isn’t.

 

For example, by only providing users and devices with the minimum permissions needed to perform their tasks, your organization can drastically reduce its attack surface. Segmenting internal networks and limiting access to assets makes it more difficult for malicious actors to move laterally through organizational resources. Continuous monitoring provides increased visibility into all traffic and activity, enhancing an organization’s ability to detect and respond to anomalous and malicious activity more quickly.

 

Additional benefits provided by the adoption of a Zero Trust architecture include: reducing the potential scope and impact of a successful attack and supporting security and privacy initiatives and compliance. It’s important to remember that Zero Trust is a journey, begin by addressing an identified use case and expand from there.

 

For more information on Zero Trust and how 11:11 Systems can help, check out these additional resources:

    • Webinar – Securing Cloud with Zero Trust
    • White Papers –  How 11:11 Systems supports Zero Trust Security and  How to Pick a Cloud Your CIO Will Love: 13 Questions to Ask
    • Product Pages – 11:11 Cloud and 11:11 Cloud Backup

 

 

Categories: Connectivity, Cloud Backup, Cybercrime, Ransomware, SecurityBy Brandon LeikerFebruary 12, 2024
Tags: Zero Trust ArchitectureZero Trust Securityzero trustCloud ComputingBackup and disaster recoveryFirewallThe NIST CyberSecurity FrameworkCloudConnectivityCybercrimeManaged Security Servicescyber threatsCloud BackupData ProtectionCloud Services
Brandon Leiker

Author: Brandon Leiker

Brandon Leiker is a Principal Solutions Architect, Security at 11:11 Systems. In his role, Brandon supports the global solution architecture team by leading security discussions and designing security solutions. He has over 20 years of experience in IT and security across multiple verticals including energy, financial services, medical, banking, and manufacturing. Brandon’s background includes solution architecture, implementation, administration, security operations, and strategy, as well as governance, risk management, and compliance. He holds a master’s degree in Information Assurance Management and a bachelor’s in Information Networking and Telecommunications, both from Fort Hays State University in Kansas. In addition, Brandon holds numerous industry certifications, including CCSP, CISSP, CISA, CISM, CRISC, and CCISO.

Post navigation

PreviousPrevious post:How to navigate changes to VMware licensing.NextNext post:Did you leave your front door open? Why cyberattacks surge using valid credentials

Related Posts

Sell Smarter, Close Faster: How 11:11’s Network as a Service Puts Partners in the Driver’s Seat
August 24, 2025
Better Network Visibility with New 11:11 Cloud Console Tools
August 21, 2025
Graphic depiction of a backup repository
Simplify VBR Direct Repository Migration with VeeaMover
August 11, 2025
VMware Partner
Major VMware Partnership Announcement and How 11:11 Systems Keeps You Moving Forward
July 16, 2025
Entra ID
Recovering Entra ID with Veeam
July 16, 2025
Digital Operational Resilience Act (DORA)
Helping the Financial Sector Deliver Secure and Modern Infrastructure through Regulation
July 10, 2025
PRODUCTS & SERVICES
  • Cloud
  • Backup
  • Disaster Recovery
  • Managed Security
  • Network as a Service
  • Compliance
COMPANY
  • Why 11:11
  • Customer Stories
  • Careers
  • Leadership
  • Technology Partners
  • News & Media
  • Contact Support
CLOUD REGIONS
  • North America
  • EMEA
  • APAC
CONNECT
  • LinkedIn
  • X
  • Youtube

© 2025 11:11 Systems Inc., All Rights Reserved | Privacy Notice | Website Terms of Use |

Go to Top