Head of Product
11:25 AM Zero Trust: A New Model to Secure Access to Corporate Resources in Cloud and Hybrid Environments
The enterprise environment is going digital and becoming hybrid and distributed. As a result, the traditional network perimeter solutions such as VPNs, DMZs and NACs can no longer provide the security, flexibility and agility required for the modern business and adequately protect the organizations’ servers, applications and workloads.
To address these business needs, the security architecture must shift from the network level focus to the identity, device and applications level, and in fact – implement a Zero Trust Access model.
By leveraging the Zero Trust model, an organization can enforce an easy-to-manage access policy that is unified regardless of where the users, devices or resource are located.
With this shift, you can also govern the activities of standard or privileged accounts, across any resource with full audit trail of the user’s action leading to simplified data governance and compliance.
Leveraging the Zero Trust access model also significantly limits the network attack surface and the attacker’s ability to move laterally across the environment.
The discussion will include:
•What are the building blocks of a Zero Trust architecture? How can you combine identity-as-a-service and device management with network level security? What are the alternatives and the related pros and cons?
•How can a Zero Trust access model support the modern organization’s security, flexibility and agility requirements?
Real world case studies of: operations team access (DevOps), third party access, M&A IT integration and cloud migration based on user, device and application context.