They were working from home, a coffee shop, a hotel or even on a bus or airplane. A growing number of employees were not in the office at all times.This is the way most organizations protect themselves.īy 2011, it became clear to Google that this model was problematic, and we needed to rethink how enterprise services are accessed and protected for the following reasons: If they're outside the office, at home or in a coffee shop, they frequently use a VPN to get access to services behind the enterprise firewall. If an employee is in a corporate office, on the right network, services are directly accessible. With a traditional enterprise perimeter security model, access to services and resources is provided by a device being connected to a privileged network.
GOOGLE BEYONDCORP PRICING SERIES
This is the first post in a series that will focus on Google’s internal implementation of BeyondCorp, providing necessary context for how Google adopted BeyondCorp.
With that anniversary looming and many organizations actively working to adopt models like BeyondCorp (which has also become known as Zero Trust in the industry), we thought it would be a good time to revisit topics we have previously explored in those papers, share the lessons that we have learned over the years, and describe where BeyondCorp is going as businesses move to the cloud. It's been almost five years since we released the first of multiple BeyondCorp papers, describing the motivation and design principles that eliminated network-based trust from our internal networks. Posted by Lior Tishbi, Program Manager and Puneet Goel, Product Manager, Justin McWilliams, Engineering Manager