Moving Beyond Perimeter Security - Zero Trust, Does It Really Work?

Logo
Presented by

Nick Hawkins, Senior Director, Enterprise Program Management, Akamai

About this talk

The “trust but verify” security model is no longer effective as new business models and processes move users, devices, applications and data beyond the traditional enterprise perimeter. The surge in new attack surfaces demands a new approach to security in the form of a zero trust model. Find out the four steps to start a zero trust security journey and immediately improve defences: - Move to a least-privilege application access model - Proactive protection against zero-day malware - Eliminate traditional VPN for specific user groups - Enable a Zero Trust architecture model Make sure you also register for the live 'Ask-Me-Anything' session here: https://www.brighttalk.com/webinar/ama-live-for-all-your-security-questions
Related topics:

More from this channel

Upcoming talks (1)
On-demand talks (214)
Subscribers (11876)
Leading companies worldwide choose Akamai to build, deliver, and secure their digital experiences — helping billions of people live, work, and play every day. Akamai Connected Cloud, a massively distributed edge and cloud platform, puts apps and experiences closer to users and keeps threats farther away. Learn more about Akamai’s cloud computing, security, and content delivery solutions.