Skip to main content Skip to footer
CyberRatings
  • Research & Testing
    • Test Reports
      Browser Security
      Cloud Network Firewall
      Endpoint Protection
      Enterprise Firewall (formerly NGFW)
      Software-Defined Wide Area Network (SD-WAN)
      Security Service Edge (SSE) Threat Protection
      Zero Trust Network Access (ZTNA)
    • Mini TestsHow effective are the Cloud Service Provider (CSP) native cloud firewall offerings?What does "Secure by Default" mean for Security Service Edge solutions?
Our Ratings SystemResearch
  • Media
    • Blog
    • Press
    • Podcasts & Videos
  • Services
    • Test ToolsCyPerf Trial
  • NSS Labs Archive
0
Log inSign up
CyberRatings
Log inSign up
0
  • CyberRatings
  • Research & Testing
    • Browser Security
    • Cloud Network Firewall
    • Endpoint Protection
    • Enterprise Firewall (formerly NGFW)
    • Software-Defined Wide Area Network (SD-WAN)
    • Security Service Edge (SSE) Threat Protection
    • Zero Trust Network Access (ZTNA)
    • Mini Tests
    • How effective are the Cloud Service Provider (CSP) native cloud firewall offerings?
    • What does "Secure by Default" mean for Security Service Edge solutions?

    • Our Ratings System
    • Research
  • Media
    • Blog
    • Press
    • Podcasts & Videos
  • Services
    • Test ToolsCyPerf Trial
  • NSS Labs Archive
  • Log inSign up
  • CyberRatings
  • Research & Testing
    • Test Reports
    • Browser Security
    • Cloud Network Firewall
    • Endpoint Protection
    • Enterprise Firewall (formerly NGFW)
    • Software-Defined Wide Area Network (SD-WAN)
    • Security Service Edge (SSE) Threat Protection
    • Zero Trust Network Access (ZTNA)
    • Mini Tests
    • What does "Secure by Default" mean for Security Service Edge solutions?

    • Our Ratings System
    • Research
  • Media
    • Blog
    • Press
    • Podcasts & Videos
  • Services
  • NSS Labs Archive
  • Log inSign up

Read the press release on 2025 Cloud Network Firewall Test Results

Blog

« Back
« Back

Trust but Verify: A Timeless Principle Applied to Cybersecurity

February 29, 2024CyberRatings.orgBlog

“Trust but Verify,” a maxim that has crisscrossed history, finds its place at the heart of cybersecurity practices today, and its critical application in Security Service Edge (SSE) implementations.

Historical Perspective of Trust but Verify

Famously adopted by President Ronald Reagan during nuclear disarmament discussions with the Soviet Union, “Trust but Verify” underscores the importance of not just accepting promises at face value but also confirming their validity through evidence.

Relevance in Today’s Digital Landscape

This principle is more relevant than ever. The cyber world is inherently invisible and intangible, where threats can emerge from any corner, masked by the very technology that’s supposed to protect us. Trust in this context is not just given; it must be earned and continually reassured through rigorous verification.

Applying ‘Trust but Verify’ to SSE Implementations

SSE offers sophisticated security services directly from the cloud, promising to shield organizations from a myriad of cyber threats. Here’s how the “Trust but Verify” principle becomes crucial:

  1. Vendor Promises: Organizations trust their SSE providers to deliver robust security solutions. However, it’s imperative to verify that these solutions are performing as promised, effectively protecting against the full spectrum of cyber threats.
  2. Policy Enforcement: SSE involves setting policies that control access to network resources. While organizations must trust their employees and users, they also need mechanisms to verify that policies are being followed correctly and are not inadvertently allowing security breaches.
  3. System Updates and Patches: Regular updates are essential for the health of any cybersecurity system. While providers are trusted to maintain these updates, organizations must have processes to verify that updates are applied promptly and effectively, closing any potential security gaps.
  4. Response to New Threats: The cyber landscape is continuously evolving, with new threats emerging regularly. Trusting an SSE solution involves the expectation that it can adapt to new threats. Verification, in this case, means ensuring the system is truly evolving and that new types of attacks are being effectively countered.
  5. Compliance and Regulations: SSE must comply with a plethora of regulations and standards. While providers may assert compliance, organizations have the responsibility to verify that these claims are accurate and that the SSE’s operations are within regulatory boundaries.

Conclusion

In the context of SSE, “Trust but Verify” is not just a suggestion—it’s a necessity. This principle is essential for maintaining the integrity of cybersecurity measures in a rapidly changing digital world. It encourages a proactive stance, prompting continuous verification and assurance of security practices.

As we continue our exploration of SSE, we encourage you to reflect on this principle and how it’s embedded in your cybersecurity strategy.

Related content

Zscaler Zero Trust Exchange Earns “AAA” Rating in CyberRatings.org Security Service Edge Threat Protection Test.

June 11, 2024
PRESS RELEASE

Security Service Edge (SSE) Threat Protection

Technology

Our Adversarial Approach to Testing at CyberRatings

April 9, 2025
BLOG

Sign up for our Newsletter

515 South Capital of Texas Highway
Suite 225
Austin, TX 78746

Phone: +1 (512) 333-1734

Fax: +1 (512) 727-2130

Contact Us

Research & Testing

  • Browser Security
  • Cloud Network Firewall
  • Endpoint Protection
  • Enterprise Firewall (formerly NGFW)
  • Software-Defined Wide Area Network (SD-WAN)
  • Security Service Edge (SSE) Threat Protection
  • Zero Trust Network Access (ZTNA)
Mini TestsHow effective are the Cloud Service Provider (CSP) native cloud firewall offerings?What does "Secure by Default" mean for Security Service Edge solutions?Our Ratings SystemResearch

Services

  • Test Tools
  • CyPerf Trial

Media

  • Blog
  • Press
  • Podcasts & Videos

About Us

  • Our Mission
  • Leadership

Research & Testing

  • Browser Security
  • Cloud Network Firewall
  • Endpoint Protection
  • Enterprise Firewall (formerly NGFW)
  • Software-Defined Wide Area Network (SD-WAN)
  • Security Service Edge (SSE) Threat Protection
  • Zero Trust Network Access (ZTNA)
Mini TestsHow effective are the Cloud Service Provider (CSP) native cloud firewall offerings?What does "Secure by Default" mean for Security Service Edge solutions?Our Ratings SystemResearch

Services

  • Test Tools
  • CyPerf Trial

Media

  • Blog
  • Press
  • Podcasts & Videos

About Us

  • Our Mission
  • Leadership

Copyright © 2022 - 2025 CyberRatings.org, All Rights Reserved. Use of this site governed by the Terms of Service

Privacy PolicyCopyright & Quote PolicyCookie Policy
Forgot Password?
Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.
body::-webkit-scrollbar { width: 7px; } body::-webkit-scrollbar-track { border-radius: 10px; background: #f0f0f0; } body::-webkit-scrollbar-thumb { border-radius: 50px; background: #dfdbdb }