From Zero to Hero: Integrating Zero Trust in a Burgeoning IoT Landscape

Logo
Presented by

Colin Geis, Product Manager, Cradlepoint; Bruce Johnson, Senior Product Marketing Manager, Cradlepoint

About this talk

Like clusters of mushrooms taking over the limbs of a downed tree, IoT devices are spreading across networks and becoming more intertwined with life on all levels. Although they can obtain valuable data and improve operational efficiencies, IoT connections found in grocery kiosks, surveillance cameras, manufacturing floors, and thermometers are all contributing to a growing attack surface that bad actors are eager to penetrate. To protect IoT devices, the networks they’re on, and the users who rely on them, enterprise businesses must look to a solution that is more manageable, scalable, and effective than traditional VPNs. That’s where the “never trust; always verify” security of a zero trust network comes in. Join this webinar to learn: -The challenges of securing IoT devices -Why zero trust is important in IoT environments -The difference between zero trust and Zero Trust Network Access (ZTNA)
Related topics:

More from this channel

Upcoming talks (1)
On-demand talks (154)
Subscribers (49546)
Ericsson’s high-performing, programmable networks provide connectivity for billions of people every day. For nearly 150 years, we’ve been pioneers in creating technology for communication. We offer mobile communication and connectivity solutions for service providers and enterprises. Together with our customers and partners, we make the digital world of tomorrow a reality. www.ericsson.com