Hi [[ session.user.profile.firstName ]]

Securely Enable Your Remote Workforce with Zero Trust Data Access and no VPN

Edge Computing Association webinar on how to use Zero Trust to securely enable your remote workforce to remotely share and access your entire hybrid-IT infrastructure over the internet without using a VPN.

Looks at the problems of perimeter-based security today and how VPN remote access is being replaced by zero trust. Short lesson on what zero trust is, the components of zero trust, how it is applied into organizations and how it is applied to remote data access and sharing.
Recorded Sep 24 2020 32 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Thomas Ward - Qnext Corp., Phil Bliss - ECA
Presentation preview: Securely Enable Your Remote Workforce with Zero Trust Data Access and no VPN

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • How Zero Trust Extends Office 365 Functionality into a Hybrid-IT Infrastructure Oct 29 2020 4:00 pm UTC 45 mins
    Tom Ward - Qnext Corp, Phil Bliss- ECA, Romuel Romualdo - IT Expert
    Edge Computing Association webinar on how zero trust extends Office 365 functionality into a modern hybrid-IT infrastructure.

    Today’s modern organization has a hybrid-IT infrastructure – that is a combination of on-premises and cloud-hosted servers and storage. The problem is that Office 365 only provides remote access to one of these many places your files might be – that is OneDrive. That forces your users to either copy and sync their important files to OneDrive or to use OneDrive as their primary storage.

    The challenge comes when you want to remotely access or share files stored on your hybrid-IT infrastructure other than on your own OneDrive or when you need to maintain privacy and confidentiality over files. Is a VPN the only route?

    Zero Trust Data Access (ZTDA) is a fantastic new technology that will extend your Office 365 functionality into all of your hybrid-IT infrastructure. That is because of the mechanisms and technology that enables zero trust. The use of encrypted tunnels to micro-segmented storage will allow users from a single-pane-of-glass to remotely access, share and edit an Office 365 file located anywhere on your hybrid-IT infrastructure – from on-premises storage such as a NAS, SAN, DAS, PC or on-premises implementation of SharePoint, to cloud-hosted infrastructure such as Amazon, Azure, Google, to enterprise-grade, private and public cloud storage. It provides access to all of these over an ordinary internet connection, without the need for a VPN. And it does so with the highest levels of security available – through a zero-trust platform.

    Romel Romualdo is an IT expert with extensive experience helping major enterprises with new technology. He will talk about the issues and problems that organizations face regarding remote access. Tom Ward will explain how zero trust data access technology addresses these issues and securely extends remote access of Office 365 into the entire hybrid-IT infrastructure, without the need of a VPN.
  • Zero Trust Sharing of On-Premises Implementations of SharePoint Recorded: Oct 8 2020 35 mins
    Tom Ward - Qnext, Phil Bliss - ECA
    Edge Computing Association webinar on how to use Zero Trust Data Access to share with external parties and provide remote access to an on-premises implementation of SharePoint.

    If you have an on-premises implementation of SharePoint you know that even though it is a great Intranet tool, it does not allow sharing with external parties, it is not easy to access remotely (without a VPN) and it is a separate silo of information. However, Zero Trust Data Access (ZTAA) is a fantastic new technology that will revive your on-premises implementation of SharePoint. That is because the zero trust platform secures access and sharing from the source locations including an onsite implementation of SharePoint eliminating the need to duplicate to a cloud server or need to migrate to the cloud-hosted implementation of SharePoint – even to external parties such as contractors and gig workers.
  • Accès et partage de données sécurisées en ZeroTrust à la place d’un VPN Recorded: Oct 7 2020 35 mins
    JC Dumas - Director Emea & India, Qnext Corp.
    Avec la multiplication des sources et le travail à la maison, l’accès aux données de vos clients est devenu un cauchemar ? La sécurisation du périmètre n’est plus car les données et le staff sont hors du périmètre.. les VPNs ne suivent plus et deviennent des failles dans la sécurité.

    Enregistrez-vous au prochain webinaire Fileflex pour en savoir plus sur l’accès aux données en mode zerotrust (confiance nulle), le nouveau standard pour vous et vos clients. Logiciel en mode multi-tenant, abordable tout en offrant des marges confortables, vos nouvelles opportunités de services pendant et après le Covid.
  • Securely Enable Your Remote Workforce with Zero Trust Data Access and no VPN Recorded: Sep 24 2020 32 mins
    Thomas Ward - Qnext Corp., Phil Bliss - ECA
    Edge Computing Association webinar on how to use Zero Trust to securely enable your remote workforce to remotely share and access your entire hybrid-IT infrastructure over the internet without using a VPN.

    Looks at the problems of perimeter-based security today and how VPN remote access is being replaced by zero trust. Short lesson on what zero trust is, the components of zero trust, how it is applied into organizations and how it is applied to remote data access and sharing.
  • Zero Trust Data Collaboration for Remote Workers Recorded: Apr 21 2020 31 mins
    Thomas Ward - Qnext Corp, Phil Bliss - ECA
    Edge Computing Association webinar on zero trust data collaboration for remote workers.

    Looks at today’s major technology inflections – rise of the distributed workforce, emergence of hybrid-IT, movement to zero trust and importance of data governance. Then looks at a practical solution that addresses these inflections to enable your remote workforce with zero trust access to your organization’s storage.
  • Understanding and Addressing Vectors of Attack Recorded: Jan 28 2020 22 mins
    Thomas Ward - Qnext Corp, Phil Bliss - ECA
    Edge Computing president Phil Bill interviews Tom Ward – VP of Qnext Corp – about vectors of attack and how they are addressed with FileFlex Enterprise.

    Looks at the embedding of malware in an email spear-phishing attack, man-in-the-middle, unauthorized access and storing of files on the servers of third-parties and how these vectors of attack are addressed with FileFlex Enterprise.
  • Increase Security Through Remote Data Access & Sharing of On-Premises Storage Recorded: Oct 1 2019 28 mins
    Michelle Drolet - Towerwall Inc, Thomas Ward - Qnext Corp, Paul Barker - ECA
    Edge Computing Association hosted webinar on providing remote data access and sharing to on-premises storage of servers, server-attached, NAS and SharePoint to protect confidentiality and increase security vs duplicating files to third-party servers (ie Cloud storage).

    Michelle Drolet, CEO of Towerwall looks at the option of using third-party cloud vendors and issues such as loss of control, regulations, unexpected cost creep, single point of failure and then the on-premises alternative.

    Tom Ward, VP Marketing of Qnext takes a deeper dive into providing remote data access and sharing to your on-premises storage and how to turn your entire corporate storage structure into a virtual resident cloud. This new alternative is the best way to protect confidentiality, increase control and security and lower costs for the remote data access and sharing for your workforce.
  • The Next Evolution in Secure Computing Architecture Recorded: Mar 27 2019 44 mins
    Vivek Gautam - Markets and Markets, Thomas Ward - Qnext Corp, Phil Bliss - ECA
    Global research firm Markets and Markets discusses the next evolution in secure computing architecture with the Edge Computing Association.

    Vivek Gautam, head of digitization and blockchain practice at global research firm Markets and Markets looks at the up and coming technologies in secure computing architecture over the 18 months and in particular the movement back to on-premises edge devices.

    Tom Ward, VP of marketing at Qnext Corp then expands on how this next generation of secure architecture is applied to remote access and sharing to address privacy, security and productivity.
Zero Trust Remote Access and Sharing of Hybrid-IT Storage
This channel contains educational webinars from industry experts on zero trust, cybersecurity, hybrid-IT storage and productivity.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Securely Enable Your Remote Workforce with Zero Trust Data Access and no VPN
  • Live at: Sep 24 2020 6:00 pm
  • Presented by: Thomas Ward - Qnext Corp., Phil Bliss - ECA
  • From:
Your email has been sent.
or close