An ever-evolving IT environment and cyber-threat landscape have made legacy security infrastructures ineffective. Based on the outdated assumption that anything within the security perimeter can be trusted, they leave organisations exposed to cyber-attacks. Across the industry, security professionals are designing and rebuilding their strategies around a Zero Trust approach, one that trusts no user, device or system, neither inside nor outside the perimeter.Tony Jarvis, Chief Technology Officer, Asia Pacific, Middle East & Africa at Check Point Software Technologies tells us why we should care about this Zero Trust approach.