Hi [[ session.user.profile.firstName ]]

Software Defined Perimeter in Real Life

The Software Defined Perimeter (SDP) is the key to defending your organization amid so much uncertainty. But how does SDP work in the real world?

Hear Safe-T’s Eitan Bremler and Chief Security Architect of Alight Solutions Yabing Wang as they explored:

The Software Defined Perimeter architecture
How to address and prevent insider threats with Safe-T’s Telepath Behavioral Analytics
Real life SDP applications and two SDP customer success stories
Recorded Jul 24 2019 41 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Yabing Wang - VP & Chief Security Architect Alight Solutions, Eitan Bremler - Co-Founder & VP Technology Safe-T
Presentation preview: Software Defined Perimeter in Real Life

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Safe-T ZoneZero - Why Rip and Replace Your VPN if You Don’t Need to? Oct 16 2019 5:00 pm UTC 60 mins
    Richard Greenberg, CISSP, OWSAP Foundation; Eitan Bremler - Co-Founder & VP Technology Safe-T
    VPNs have been a cornerstone of secure networking for the last 20+ years. While VPNs have stood the test of time, today, we now know that a true security architecture is hinged upon the concept of Zero Trust Network Access. Today, most organizations have already poured a great deal of time and resources into building out their VPN infrastructure. Considering that the technology does exactly what it’s supposed to do, ripping and replacing it may not make much sense.
    What if we tell you that you don’t have to rip and replace your VPN in order to start your journey towards Zero Trust Network Access? Join us to this webinar to find out how.
  • Software Defined Perimeter in Real Life Recorded: Jul 24 2019 41 mins
    Yabing Wang - VP & Chief Security Architect Alight Solutions, Eitan Bremler - Co-Founder & VP Technology Safe-T
    The Software Defined Perimeter (SDP) is the key to defending your organization amid so much uncertainty. But how does SDP work in the real world?

    Hear Safe-T’s Eitan Bremler and Chief Security Architect of Alight Solutions Yabing Wang as they explored:

    The Software Defined Perimeter architecture
    How to address and prevent insider threats with Safe-T’s Telepath Behavioral Analytics
    Real life SDP applications and two SDP customer success stories
  • Software Defined Perimeter in Real Life Recorded: Jul 17 2019 41 mins
    Yabing Wang - VP & Chief Security Architect Alight Solutions, Eitan Bremler - Co-Founder & VP Technology Safe-T
    The Software Defined Perimeter (SDP) is the key to defending your organization amid so much uncertainty. But how does SDP work in the real world?

    Hear Safe-T’s Eitan Bremler and Chief Security Architect of Alight Solutions Yabing Wang as they explored:

    The Software Defined Perimeter architecture
    How to address and prevent insider threats with Safe-T’s Telepath Behavioral Analytics
    Real life SDP applications and two SDP customer success stories
  • Software Defined Perimeter in Real Life Recorded: Jul 1 2019 42 mins
    Yabing Wang - VP & Chief Security Architect Alight Solutions, Eitan Bremler - Co-Founder & VP Technology Safe-T
    The Software Defined Perimeter (SDP) is the key to defending your organization amid so much uncertainty. But how does SDP work in the real world?

    Hear Safe-T’s Eitan Bremler and Chief Security Architect of Alight Solutions Yabing Wang as they explored:

    The Software Defined Perimeter architecture
    How to address and prevent insider threats with Safe-T’s Telepath Behavioral Analytics
    Real life SDP applications and two SDP customer success stories
Zero Trust Access Solutions Provider
Safe-T Group Ltd. (Nasdaq, TASE: SFET) is a provider of Zero Trust Access solutions which mitigate attacks on enterprises’ business-critical services and sensitive data, while ensuring uninterrupted business continuity.
Safe-T’s cloud and on-premises solutions ensure that an organization’s access use cases, whether into the organization or from the organization out to the internet, are secured according to the “validate first, access later” philosophy of Zero Trust. This means that no one is trusted by default from inside or outside the network, and verification is required from everyone trying to gain access to resources on the network or in the cloud.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Software Defined Perimeter in Real Life
  • Live at: Jul 24 2019 2:00 pm
  • Presented by: Yabing Wang - VP & Chief Security Architect Alight Solutions, Eitan Bremler - Co-Founder & VP Technology Safe-T
  • From:
Your email has been sent.
or close