The concept of “Zero Trust” or “Trust but Verify” has been around for quite a while. But now, because of the expanding perimeter, API-driven architecture, IoT, and microservices, there is no way to accomplish this if it means manual intervention. But what does a Zero Trust architecture look like? What will happen if you use Zero Trust?
Join Vadim Lander, Symantec Identity Security CTO & Distinguished Engineer at Broadcom, where he will describe what a comprehensive Zero Trust environment needs to include to achieve your identity security goals without unnecessary disruption to your users, your developers, or your business processes.