What to Do Before They Get In: Minimizing Cyber Exposure with Micro-Segmentation

Presented by

Martin Fabry, Syed Ashraf

About this talk

It’s only a matter of time. Organizations large and small must face the reality that attackers will find a way to penetrate your network. Whether it is a vulnerability, a configuration error, or phishing, some resource behind your corporate firewall is bound to get compromised. What happens next is a matter of how well an organization is prepared. One critical aspect in preparation for such an event is application segmentation behind your corporate edge firewall - the tools and practice of compartmentalizing applications and resources such that compromise does not give an attacker free reign in your network. But traditional segmentation using VLANs and firewalls requires major infrastructure surgery. How can you quickly and easily protect applications and shield them against attackers without re-engineering your network infrastructure? In this 30-minute webinar, Zentera’s technical experts will review how Zero Trust and SASE overlay combine to make application segmentation extremely simple and launch in an hour to protect specific users, endpoints, and even application processes. They will present common use cases, contrast different technical approaches, discuss how micro-segmentation is a fundamental requirement for Zero Trust security and attack surface minimization, and demonstrate how the overlay-based approach enables instant application onboarding without infrastructure changes.

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (3)
Subscribers (87)
With content ranging from strategic Digital Transformation issues driving the industry to detailed instructional how-tos, this channel covers topics in Zero Trust cybersecurity. Major areas of focus include secure remote access, privileged access, micro-segmentation, and collaboration, for IT, OT, and cloud workloads.