Never Trust, Always Verify

Presented by

Harry Sverdlove, Founder and CTO of Edgewise Networks

About this talk

The perimeter model of network security is broken – attackers have little difficulty in spoofing IP addresses or piggybacking malicious software on top of policy-permitted network traffic to gain access to the network. And once inside the network, it's a simple task for attackers to move laterally until they find the pot of gold and exfiltrate. Harry Sverdlove, Founder and CTO of Edgewise, took a look at the four steps to implementing a zero trust methodology in your network: - Identify your assets - Map your workloads - Implement intent-based security policies - Continuously monitor and adapt to workload changes

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (16)
Subscribers (1879)
Edgewise Networks stops attack progression in the cloud and data center by allowing only trusted applications to communicate over approved network pathways.