3-Part Webinar Series: Adopting Zero-Trust Security: Part 3

Logo
Presented by

Mudit Tyagi, F5 | Corey Marshall, F5 | Ken Arora, F5

About this talk

Part 3: Adopting Zero Trust for Secure Digital Experiences Zero trust is driven by a simple philosophy: Never implicitly trust; always verify; and continuously monitor. And zero trust-based security is achieved by applying zero trust principles across the entire security stack, application delivery stack, and the application development lifecycle. We’ll cover how to achieve zero trust with security solutions that offer continuous monitoring of payload in transaction between users and workloads, and those that occur among workloads with WAF in appropriate form factor, as well as machine-learning based identification of anomalies and automated calculation of risk for HTTP/S transactions. In this webinar, you’ll learn: - Zero Trust reference architecture, based on NIST 800-207 - Maturity model for zero trust based on CISA - How F5 can help, through authentication and transaction-aware access control, and more
Related topics:

More from this channel

Upcoming talks (3)
On-demand talks (284)
Subscribers (13723)
F5 is a multicloud application security and delivery company committed to bringing a better digital world to life. F5 partners with the world’s largest, most advanced organizations to secure every app—on premises, in the cloud, or at the edge. F5 enables businesses to continuously stay ahead of threats while delivering exceptional, secure digital experiences for their customers. For more information, go to f5.com.