Technological Approaches to a Zero Trust Security Model

Logo
Presented by

John Tolbert, Lead Analyst, KuppingerCole, Richard Meeus, Director of Security, Technology and Strategy, EMEA, Akamai

About this talk

The traditional model of enforcing security at the network perimeter is no longer valid as employees, devices, and workloads move outside the corporate network. A Zero Trust model offers an alternative that secures data while ensuring it is accessible from wherever employees are working. But finding the right technological approaches to Zero Trust is challenging. Join this KuppingerCole webinar to: - Understand how best to approach implementing Zero Trust - Explore the technological considerations and options available - Learn how to create a smarter way for users to access applications - Discover effective ways to protect users from cyberthreats - Learn how to deliver a phish-proof MFA strategy - Get answers to your questions about Zero Trust

Related topics:

More from this channel

Upcoming talks (4)
On-demand talks (91)
Subscribers (7367)
Akamai secures and delivers digital experiences for the world’s largest companies. Our intelligent edge platform keeps apps and experiences closer to users — and attacks and threats far away. Top brands globally rely on Akamai so their businesses can be fast, smart, and secure.