Before diving deep into endpoint security, let's first understand the different network models that are available. As pointed out earlier, most organizations today will have a single trust network model but, throughout the last years, many organizations have started to move to dual trust and even zero-trust network models.
Network models
Single trust network model
The single trust network model is the most commonly used IT perimeter network model. It's based on the assumption that a number of firewalls can control the network from outside to the inside of the environment:
The problem with the single trust network boundary that many organizations use today is that it has very little protection against external threats...