Extending Zero Trust to the Endpoint

Logo
Presented by

John Kindervag, Field CTO, Palo Alto Networks & Lieuwe Jan Koning, CTO, ON2IT B.V.

About this talk

Zero Trust is a familiar concept when speaking about network architecture. The terms "never trust, always verify" rings a familiar tune to those focused on securing the network. However, as security technologies have advanced to cross-communicate between network and endpoints, Zero Trust principles should also extend from the network to the endpoints. Join John Kindervag, the creator of the Zero Trust model, former Forrester analyst and current Field CTO at Palo Alto Networks, as he: - Discusses why endpoints need to talk to and integrate with other security technologies - Maps Zero Trust to the five critical points of the security architecture - Provides a framework as to why and how to extend Zero Trust to the endpoint We'll also be hearing from, Lieuwe Jan Koning, CTO and Co-Founder of ON2IT, for an actual use case on endpoint Zero Trust adoption. Lieuwe will discuss: - Why ON2IT chose to focus on the endpoint - How they adopted Zero Trust - And, the reason why they chose Palo Alto Networks Traps advanced endpoint protection to secure their endpoints
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (853)
Subscribers (104271)
Palo Alto Networks is the next-generation security company, leading a new era in cybersecurity by safely enabling applications and preventing cyber breaches for tens of thousands of organizations worldwide. Built with an innovative approach and highly differentiated cyberthreat prevention capabilities, our game-changing security platform delivers security far superior to legacy or point products, safely enables daily business operations, and protects an organization's most valuable assets. Find out more at www.paloaltonetworks.com or call us at 1-877-524-1031.