Hi [[ session.user.profile.firstName ]]

What to Do Before They Get In: Minimizing Cyber Exposure with Micro-Segmentation

It’s only a matter of time. Organizations large and small must face the reality that attackers will find a way to penetrate your network. Whether it is a vulnerability, a configuration error, or phishing, some resource behind your corporate firewall is bound to get compromised. What happens next is a matter of how well an organization is prepared. One critical aspect in preparation for such an event is application segmentation behind your corporate edge firewall - the tools and practice of compartmentalizing applications and resources such that compromise does not give an attacker free reign in your network. But traditional segmentation using VLANs and firewalls requires major infrastructure surgery. How can you quickly and easily protect applications and shield them against attackers without re-engineering your network infrastructure?

In this 30-minute webinar, Zentera’s technical experts will review how Zero Trust and SASE overlay combine to make application segmentation extremely simple and launch in an hour to protect specific users, endpoints, and even application processes. They will present common use cases, contrast different technical approaches, discuss how micro-segmentation is a fundamental requirement for Zero Trust security and attack surface minimization, and demonstrate how the overlay-based approach enables instant application onboarding without infrastructure changes.
Recorded Feb 18 2021 32 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Martin Fabry, Syed Ashraf
Presentation preview: What to Do Before They Get In: Minimizing Cyber Exposure with Micro-Segmentation

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Network Security in the Age of Remote Working Recorded: Apr 15 2021 64 mins
    Kalani Enos, Kenos Technologies | Mike Ichiriu, Zentera | Mike Grimshaw, Moovweb | Robinson Delaugerre, Orange Cyberdefense
    The pandemic and the shift to remote working has strained networks and pushed organizations to speed up their digital transformation journeys. With more users on the network than ever before, security has become a key priority.

    Discover how organizations are addressing the security challenges of remote working and the latest trends in network security.

    Join this panel of security experts and industry leaders to learn more about:
    - The impact of COVID on networks and security
    - The emergence of secure access service edge (SASE)
    - The need for smart network monitoring technology
    - New and old threats, and common vulnerabilities
    - Lessons from the SolarWinds hack
    - Best practices and recommendations for strengthening security in 2021


    Kalani Enos, Kenos Technologies
    Mike Ichiriu, VP, Zentera
    Mike Grimshaw, Sre & Security Manager, Moovweb
    Robinson Delaugerre, Investigations Manager (Computer Security Incident Response Team), Orange Cyberdefense
  • What to Do Before They Get In: Minimizing Cyber Exposure with Micro-Segmentation Recorded: Feb 18 2021 32 mins
    Martin Fabry, Syed Ashraf
    It’s only a matter of time. Organizations large and small must face the reality that attackers will find a way to penetrate your network. Whether it is a vulnerability, a configuration error, or phishing, some resource behind your corporate firewall is bound to get compromised. What happens next is a matter of how well an organization is prepared. One critical aspect in preparation for such an event is application segmentation behind your corporate edge firewall - the tools and practice of compartmentalizing applications and resources such that compromise does not give an attacker free reign in your network. But traditional segmentation using VLANs and firewalls requires major infrastructure surgery. How can you quickly and easily protect applications and shield them against attackers without re-engineering your network infrastructure?

    In this 30-minute webinar, Zentera’s technical experts will review how Zero Trust and SASE overlay combine to make application segmentation extremely simple and launch in an hour to protect specific users, endpoints, and even application processes. They will present common use cases, contrast different technical approaches, discuss how micro-segmentation is a fundamental requirement for Zero Trust security and attack surface minimization, and demonstrate how the overlay-based approach enables instant application onboarding without infrastructure changes.
  • 5 Easy Steps to Hybrid and Multicloud with ZTNA Recorded: Nov 19 2020 22 mins
    Martin Fabry and Syed Ashraf
    Today’s “new normal” makes the topic of secure remote access more important and relevant than ever – not just for users accessing apps, but also from app to app across the multicloud. Accelerating Digital Transformation, which is pushing apps and data to migrate to the public cloud, creates significant challenges for teams who continue to need access to on-prem apps and services.

    In this 30-minute webinar, Zentera’s technical experts will demonstrate how to secure access from the cloud back to on-prem apps and services with overlay Zero Trust Network Access. They will discuss best practices to establish trust, control least-privilege access, and monitor operations, and present how overlay approaches avoid touching the corporate firewall or VPCs.
Covering Zero Trust topics for security, IT, and cloud professionals
With content ranging from strategic Digital Transformation issues driving the industry to detailed instructional how-tos, this channel covers topics in Zero Trust cybersecurity. Major areas of focus include secure remote access, privileged access, micro-segmentation, and collaboration, for IT, OT, and cloud workloads.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: What to Do Before They Get In: Minimizing Cyber Exposure with Micro-Segmentation
  • Live at: Feb 18 2021 6:00 pm
  • Presented by: Martin Fabry, Syed Ashraf
  • From:
Your email has been sent.
or close