Zero Trust alters the way we do business: Historical IT boundaries have blurred, and employees demand home and work life balance.
While many business leaders agree that zero trust is a desirable goal to reduce risk, there is no standard definition. It encompasses segmentation, endpoint security, cloud firewalls, identity, and Zero Trust Network Access (ZTNA), yet there are multiple standards bodies, different analyst descriptions, and company’s points of view vary by industry.
In this presentation on 25 October 22 at 1:00 p.m. BST you will walk away from this session understanding:
• Zero Trust – what Zero Trust is, the key standards that define it, and why it should matter to security practitioners striving to protect their environments.
• Zero Trust Network Access (ZTNA) – the focus of the ZTNA aspect of Zero Trust, how it differs from VPN, and how it relates to Secure Access Service Edge (SASE) components.
• Zero Trust approach – the specific functionality to look for in vendor solutions to secure remote access to applications with a Zero Trust approach.
• Secure Remote Access to Applications – walk through specific scenarios that utilize a Zero Trust approach to secure remote access to applications.