InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Zero trust security for networks

Presented by

Jamie Beck and Craig Brandt

About this talk

At Red Hat, our mission is to design, adopt, and promote the use of zero trust architectural patterns. This approach takes the place of implicit trust with the principle, "never trust, always verify." The last several years have seen a rapid increase in the number of devices across organizations’ networks that are decentralized and need improved security and management. This creates internal and external risks because much of what used to be housed in offices is now in employees’ homes and running on their personal networks. At the same time, domestic and international cyberattacks are increasingly common. With many disparate tools, devices, and processes, a zero trust framework is needed to help department leads and cybersecurity professionals manage different networking environments, coordinate, investigate and respond, and work toward unifying these tools, devices, and processes. Red Hat® Ansible® Automation Platform can help to stitch these tools and processes together through automation.
Accelerate your cloud strategy

Accelerate your cloud strategy

50013 subscribers236 talks
Explore enterprise-ready solutions with open source
Discover how Red Hat’s open hybrid cloud delivers IT services on any infrastructure quickly and cost effectively with a broad portfolio of hybrid cloud infrastructure, application services, cloud-native application development, and automation solutions.
Related topics