Transforming Secure Access: This Is Not Your Legacy VPN

Presented by

Amit Bareket - Co-founder & CEO of Perimeter 81 and Paul Asadoorian - Chief Innovation Officer at Cyber Risk Alliance

About this talk

While COVID-19 may have accelerated remote work and cloud adoption, these trends have steadily prevailed as the modern workforce changed dramatically over the past decade. Despite this, organizations are still using 30-year old legacy hardware, such as VPNs, to connect to resources from outside the office. For decades, professionals in charge of organizations’ networks were entirely focused on defining perimeters and setting up a line of defense to keep threats out. This approach served businesses well, with finite exposure points and attack vectors, and adherence to established best practices and frameworks. Today, strategies are changing, and the boundaries of organizations’ networks have become borderless - ever expanding to a growing number of endpoints and networks. Accordingly, the threat landscape is increasingly dangerous. The traditional network we once knew can no longer be trusted and is no longer adequate in securing remote and on-premises access. Additionally, the typical organization’s network is more complicated than ever, and traffic through these networks is increasingly convoluted, with data flowing between local resources, cloud applications, and mobile devices in rapid succession. Join Amit Bareket (Co-founder & CEO of Perimeter 81) and Paul Asadoorian (Chief Innovation Officer at Cyber Risk Alliance) for a technical deep-dive into the problems inherent in legacy VPN technology and how traditional solutions are putting our networks at risk, instead of securing them. Together they will explore solutions for the modern workforce and how momentum toward perimeter-less architecture is helping redefine the future of cybersecurity.

Related topics:

More from this channel

Upcoming talks (1)
On-demand talks (36)
Subscribers (3739)
Cloud and mobility are creating a mega shift in traditional network security, and hardware-based solutions are not capable of accommodating this migration. Unlike legacy solutions, Perimeter 81’s Zero Trust Secure Network as a Service utilizes a Software-Defined Perimeter architecture, offering greater network visibility, seamless onboarding, and full compatibility with all major cloud providers. Perimeter 81 also incorporates robust security capabilities following the SASE model, a term coined by Gartner to describe the convergence of security and network management inside one platform. Our product, which subscribes to this new concept gives companies of all industries and sizes the power to be fully mobile and completely cloud-confident.