Secure Remote Access To Applications With A Zero Trust Approach

Logo
Presented by

Matt Brooks, Product Marketing Manager; Brandon Dunlap, Moderator

About this talk

Zero Trust alters the way we do business: Historical IT boundaries have blurred, and employees demand home and work life balance. While many business leaders agree that zero trust is a desirable goal to reduce risk, there is no standard definition. It encompasses segmentation, endpoint security, cloud firewalls, identity, and Zero Trust Network Access (ZTNA), yet there are multiple standards bodies, different analyst descriptions, and company’s points of view vary by industry. In this presentation on 25 October 22 at 1:00 p.m. BST you will walk away from this session understanding: • Zero Trust – what Zero Trust is, the key standards that define it, and why it should matter to security practitioners striving to protect their environments. • Zero Trust Network Access (ZTNA) – the focus of the ZTNA aspect of Zero Trust, how it differs from VPN, and how it relates to Secure Access Service Edge (SASE) components. • Zero Trust approach – the specific functionality to look for in vendor solutions to secure remote access to applications with a Zero Trust approach. • Secure Remote Access to Applications – walk through specific scenarios that utilize a Zero Trust approach to secure remote access to applications.
Related topics:

More from this channel

Upcoming talks (13)
On-demand talks (393)
Subscribers (93708)
ISC2 Security Briefings EMEA offers members in Europe, the Middle East and Africa a chance to learn about the latest trends, tools and best practices in cyber, information, software and infrastructure security while earning CPEs