In response to the global need to work from home, we’ve seen many government agencies put a renewed focus on equipping their workforces with modern, mission-critical technologies.
Posts Tagged: Zscaler
This roundtable discussion covered topics, from the continued relevance of the original TIC vision to the uncertainty and excitement about its evolution.
The rise of cloud, mobility and related applications effectively have undermined the concept of perimeter-based security. That is why the Trusted Internet Connection (TIC) 3.0 addresses the need to address security when users, applications and data reside outside the perimeter.
The evolution of the Trusted Internet Connection (TIC) program – from TIC 1.0 more than 10 years ago to TIC 3.0 today – reflects how technology often moves in unexpected ways.
The hope now is that agencies won’t have to bend backwards to satisfy TIC. The hope is that TIC will instead be flexible enough for agencies to adopt modern solutions tailored to their needs.
The updated Trusted Internet Connection (TIC) 3.0 policy keeps up with the modern needs that agencies have to connect to their digital working environments faster and more securely.