Control App Access with Zero Trust: A Holistic Approach

Logo
Presented by

Jay Kelley, Sr. Manager, BIG-IP Security Product Marketing, F5

About this talk

Zero trust has been the topic of discussion everywhere, and every vendor has their perspective. But what IS zero trust, and what does it deliver? What does ZTNA, ZTA, and the other related acronyms mean? While most zero trust stories start and end with how to ensure secure identity- and context-based, per request access to networks, clouds, and apps, is that all zero trust is? And is that enough? While ensuring per-app request access, controlling access, and limiting access privileges are vital as the entry point to zero trust, there is a broader story to be considered when discussing a comprehensive zero trust architecture. Learn more about zero trust, the core tenets and principles of a zero trust architecture, and how F5’s security and app delivery portfolio can enable you to deploy a holistic zero trust strategy.
Related topics:

More from this channel

Upcoming talks (6)
On-demand talks (286)
Subscribers (13984)
F5 is a multicloud application security and delivery company committed to bringing a better digital world to life. F5 partners with the world’s largest, most advanced organizations to secure every app—on premises, in the cloud, or at the edge. F5 enables businesses to continuously stay ahead of threats while delivering exceptional, secure digital experiences for their customers. For more information, go to f5.com.