3-Part Webinar Series: Adopting Zero-Trust Security - Part 1

Logo
Presented by

Corey Marshall, Director Solutions Engineering, F5 | Mudit Tyagi, Director Security | Ken Arora, Distinguished Engineer

About this talk

Part 1: : Principles and Benefits of Zero Trust Security For organizations to successfully prevent data breaches, they need to securely manage access both to and within their applications. Using the right security strategy can also drive efficiency in business processes and boost user productivity. But securing the traditional means of securing the network via “castle and moat” isn’t enough anymore, especially as more organizations support hybrid work and host their applications in multi-cloud environments. The ability to detect and contain compromise of internal applications, and prevent lateral motion of the attacker, is a key part of the next generation zero-trust strategy. By adopting zero-trust principles, you’re better able to detect tactics, techniques, and procedures (TTPs) used by an adversary at each stage of an advanced attack. This can reduce the impact of a compromise and helps defeat attackers before they accomplish their goals. In this webinar, you’ll learn: - The principles of zero trust: Use least privilege, explicitly verify, continuously assess, assume breach - The next generation zero trust: Workload-to-workload zero trust - Benefits of zero trust: Thwart advanced threats
Related topics:

More from this channel

Upcoming talks (3)
On-demand talks (284)
Subscribers (13731)
F5 is a multicloud application security and delivery company committed to bringing a better digital world to life. F5 partners with the world’s largest, most advanced organizations to secure every app—on premises, in the cloud, or at the edge. F5 enables businesses to continuously stay ahead of threats while delivering exceptional, secure digital experiences for their customers. For more information, go to f5.com.