Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Software-Defined Perimeter as a DDoS Prevention Mechanism Philip Cao HUNG (Co-Chair & Advisor, CSA Vietnam Chapter) (In Vietnamese) Distributed Denial-of-Service (DDoS) attacks are one of the most prevalent types of cyber attack, and their numbers are only climbing... 10 months ago | 30 mins How to Build a Secure Hybrid Workplace with SASE Netrix Global Team Secure Access Service Edge - SASE – is an architecture that is rapidly gaining traction among enterprises of all sizes and sectors. Yet, it requires p... 1 week ago | 46 mins Software Defined Perimeter (SDP) and Zero Trust JJ Lee (Protem Committee Exco Member, CSA Korea Chapter) In Korean Language The new era of remote work demands the change of cyber security practices for enterprises and institutions to secure sensitive dat... 1 year ago | 17 mins Zero Trust Architecture with Private IP & Software Defined Perimeter Junaid Islam, Director of Security Technology Man-in-the-middle attacks expose personal information, leaving organizations vulnerable to significant revenue loss and users open to theft and a sens... 3 years ago | 53 mins Software Eats Security: Zero Trust Software Defined Perimeter Ekta MISHRA, APAC Membership Director & Country Manager - India | Keith PRABHU, Chairman, CSA Mumbai Chapter Software is eating the world and information security is no different. The network perimeter no longer exists. Traditional IP based security can be bl... 3 years ago | 42 mins So, You Want to Get Rid of Your VPN... Alan Hall, Director, Jeremy Follis, Technical Director, Kyle Black, Technical Director Zero Trust Network Access (ZTNA) can help, but there’s even more to consider! Software Defined Perimeter (SDP) or Zero Trust Network Access (ZTNA) is... 1 year ago | 31 mins Future Proof Your Network Security with Software Defined Perimeter (SDP) Sunil Ravi Security Principal with Versa Networks Software Defined Perimeter (SDP) provides an updated security approach to current measures that fail to address the inherent vulnerabilities in the ne... 2 years ago | 60 mins Make SDP The Next Step In Your Cloud Transformation Dhawal Sharma, Sr. Director of Product Management Gartner recommends embracing a zero trust networking strategy, due to an increasing number of users connecting to private apps from outside the networ... 4 years ago | 58 mins Software Defined Perimeter in Real Life Yabing Wang - VP & Chief Security Architect Alight Solutions, Eitan Bremler - Co-Founder & VP Technology Safe-T The Software Defined Perimeter (SDP) is the key to defending your organization amid so much uncertainty. But how does SDP work in the real world? Hea... 4 years ago | 42 mins Software Defined Perimeter in Real Life Yabing Wang - VP & Chief Security Architect Alight Solutions, Eitan Bremler - Co-Founder & VP Technology Safe-T The Software Defined Perimeter (SDP) is the key to defending your organization amid so much uncertainty. But how does SDP work in the real world? Hea... 4 years ago | 41 mins Load more