3-Part Webinar Series: Adopting Zero-Trust Security: Part 3

Logo
Presented by

Mudit Tyagi, F5 | Corey Marshall, F5 | Ken Arora, F5

About this talk

Part 3: Adopting Zero Trust for Secure Digital Experiences Zero trust is driven by a simple philosophy: Never implicitly trust; always verify; and continuously monitor. And zero trust-based security is achieved by applying zero trust principles across the entire security stack, application delivery stack, and the application development lifecycle. We’ll cover how to achieve zero trust with security solutions that offer continuous monitoring of payload in transaction between users and workloads, and those that occur among workloads with WAF in appropriate form factor, as well as machine-learning based identification of anomalies and automated calculation of risk for HTTP/S transactions. In this webinar, you’ll learn: - Zero Trust reference architecture, based on NIST 800-207 - Maturity model for zero trust based on CISA - How F5 can help, through authentication and transaction-aware access control, and more

Related topics:

More from this channel

Upcoming talks (2)
On-demand talks (227)
Subscribers (10164)
F5 specializes in application delivery networking(ADN), application availability & performance, multi-cloud management, application security, network security, access & authorization and online fraud prevention. Visit F5 at: https://www.f5.com/company