John Pironti – President, IT Architects + Bassam Khan – VP of Product and Technical Marketing, Gigamon
About this talk
Credential theft, lateral movement and other cyber-attack tricks have foiled perimeter security again and again. We know that the old philosophy of trusting everything and everyone inside a network is no longer sound. The zero trust model — trust nothing, verify everything — is the proposed answer to this problem. But it’s easier said than done in real enterprise.
In this webinar, John Pironti of IT Architects and Gigamon’s Bassam Khan share:
• what zero trust looks like in practice
• how to overcome challenges along the way
•. what security benefits you’ll realize right away
•. how your organization can take the first steps toward implementing a zero trust model
Gigamon offers a deep observability pipeline that harnesses actionable network-level intelligence to amplify the power of observability tools. This powerful combination enables IT organizations to assure security and compliance governance, speed root-cause analysis of performance bottlenecks, and lower operational overhead associated with managing hybrid and multi-cloud IT infrastructures.…