How Insurity and Reach Built a Living Zero Trust Model - with Jay Wilson & Garrett Hamilton
Would you rather run a network where everyone trusts everything, or one where nothing moves without being continuously verified? Most would agree that the most secure is ideal.
The real question is: how do you get there, and by what means? And where is "there"?
That’s the spectrum of Zero Trust maturity most organizations find themselves navigating—from implicit trust and flat networks to real-time validation and least-privilege access that adjusts as environments change.
As Jay Wilson, CIO & CISO at Insurity, puts it:
“Perfection can become the enemy of reality. You can’t roll out a perfect Zero Trust environment overnight.”
When Insurity rolled out ZTNA, they focused on progress over perfection—enhancing their model out of the gate, while leaving room to grow.
That’s where Reach came in.
By plugging into Insurity’s data models, Reach helped move from static access control to an actively managed, least-privilege model — where access isn’t assumed; it’s proven.
→ Real usage data replaces guesswork.
→ Access decisions evolve as the environment does.
→ Zero Trust becomes a living, measurable practice—not a one-time project.
🎥 Hear Jay Wilson and Reach CEO & Co-Founder Garrett Hamilton talk about how they built this “subscription drift” approach together:
https://www.reach.security/videos/conversations-with-reach-jay-wilson
Read up on how Insurity boosts their security with Reach: https://www.reach.security/customer-stories/insurity
Want to see it in action? Check out our configuration drift product demo: https://www.reach.security/configuration-drift#product-tour
#ZeroTrust #ZTNA #CyberSecurity #AI #ExposureManagement #ReachSecurity