InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Why SDP Spells the End of Remote Access VPN

Presented by

Lisa Lorenzin, Director, Emerging Technology Solutions at Zscaler

About this talk

“Many enterprises will begin using SDP to deliver a more seamless user experience.” – Jon Oltsik, ESG Research. Employees are no longer tethered to the corporate network. Many can now work from anywhere and from any device. To enable this mobility, network teams must ensure that employees can connect to applications in a seamless and secure way. In today’s digital environment, that means decoupling application access from network access while doing away with the remote access VPN -- and creating a software-defined perimeter (SDP). In this webinar, we’ll discuss why Gartner recommends the SDP as the best alternative to VPN. Learn how: - Software-defined perimeter architectures deliver a better user experience - SDP’s are not vulnerable to abuse of trust like many legacy remote access solutions - Cloud-hosted SDP services spell the end of VPN inbound gateways (DDoS, RAS, VPN, LB) About the Speaker: Lisa has more than 20 years of experience in the fields of network and information security. She specializes in zero-trust networks, software-defined perimeter solutions, and creating seamless user experiences across cloud and mobile environments.
Zscaler

Zscaler

33160 subscribers250 talks
Zero Trust + AI: Protecting What Firewalls Can't
Traditional firewalls, VPNs, and public point solutions for data security are failing in the AI era, because they expand your attack surface and allow lateral threat movement. The Zero Trust Exchange delivers a new approach that eliminates the concept of implicit trust, operating on the principle: Never trust, always verify. It delivers zero trust architecture as a service from a resilient, cloud-native AI cybersecurity platform. Acting as an intelligent switchboard to enable Zero Trust Everywhere, it provides secure, any-to-any, zero trust communication that uses business policies, not networks, for all of your workforces, branches, and clouds. The platform, built upon the Zero Trust Architecture and AI foundation, provides five integrated solutions: Cyberthreat Protection, Data Security, Zero Trust Branch and Cloud, and Security Operations.
Related topics