Hi [[ session.user.profile.firstName ]]

Four Steps to Secure Access in 2021

Some of the biggest security blunders of 2020 were tied to the exploitation of VPNs. The limitations of this 25-year-old technology were exposed just as global mass remote workforce initiatives reached a fevered pitch. VPNs are not fit for purpose in a world where secure access is more important than ever.

Watch our webinar to explore the four main pillars that are essential to the building and execution of a superior remote access strategy:
1.Confront your VPN
2.Develop your Roadmap
3.Enforce Zero Trust Access
4.Unleash Operations
Recorded Sep 2 2021 50 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Dr. Chase Cunningham, former Principal Analyst at Forrester, and Brigadier General Greg Touhill
Presentation preview: Four Steps to Secure Access in 2021

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Zero Trust: This is the Way Oct 20 2021 3:00 pm UTC 60 mins
    Jason Garbis, Chief Product Officer at Appgate, and David Holmes, Senior Analyst at Forrester
    The SolarWinds hack shook InfoSec leaders to the core. They’re increasingly asking the question: “If we had a Zero Trust security strategy in place, would it have stopped the breach?”

    This webinar dives deeper into the attack and key learnings. If there’s one thing that’s certain—it’s that Zero Trust principles have never been more necessary than they are right now.

    Webinar was originally released on May 4th

    We cover:
    • SolarWinds Attack Implications
    • How to Better Protect Your Organization
    • Why Zero Trust is Worth the Investment
  • ZTNA for the Post-Pandemic Hybrid Workforce Recorded: Oct 12 2021 59 mins
    Garrett Bekker Senior Research Analyst, Information Security 451 Research and Jason Garbis Chief Product Officer, Appgate
    Zero Trust Network Access adoption spiked in 2020 as organizations scrambled to solve an unprecedented remote access challenge. Now, looking ahead, enterprises are faced with the conundrum of staying fully remote, returning full-time to the workplace, or more likely landing somewhere in between. But not all ZTNA solutions are created equal, and many are ill-suited to address a range of use cases or environments. Learn how a fully-adaptive ZTNA solution can allow your network access strategy to adapt with the times and secure your modern workforce for both today and tomorrow

    Join this roundtable discussion to:

    Understand the limitations of remote access-only solutions
    Prevent policy complexity for hybrid remote and on-site access models
    Get guidance on building a unified network access architecture
    Explore a wide variety of use cases that can be addressed by ZTNA
    Avoid the pitfalls of deploying a ZTNA solution
  • Zero Trust Expert Q&A Breaking down the 2021 Forrester ZTNA New Wave Recorded: Oct 11 2021 20 mins
    Jason Garbis, Chief Product Officer at Appgate
    The Forrester 2021 Zero Trust Network Access (ZTNA) report was released August 24th. Written by senior analyst David Holmes, this evaluation establishes the ideal ZTNA solution functionality and provides a non-biased assessment of the 15 most significant vendors. Appgate was named a Leader with the highest position for current offering.

    Zero Trust expert Jason Garbis breaks down the report in this Q&A interview delivering his insights on:

    - What’s powering ZTNA's explosive market growth
    - Why deployment flexibility is essential to enabling real-world success
    - Why supporting non-web and legacy applications remains crucial
    - The importance of connector capabilities
    - Building ZTNA into the very fabric of the IT security ecosystem
  • What's the Real Economic Value of Zero Trust? Recorded: Sep 21 2021 56 mins
    Johna Til Johnson – CEO and Founder, Nemertes. John Burke – CTO, Nemertes. Jason Garbis – Chief Product Officer, Appgate
    Did you know that Zero Trust Network Access (ZTNA) is a catalyst for cloud migration, digital transformation and operational efficiencies? If ZTNA is on your cyber strategy wish list—or you use it for remote access and want to speed your Zero Trust security across your organization—then this session’s for you.

    Join us Tues., Sept. 21, at 11:00 a.m. ET to dive into quantifiable benefits as reported in the Nemertes Real Economic Value study on Appgate SDP, an industry-leading ZTNA solution. We’ll cover:

    The strategic advantages of using a software-defined perimeter architecture for Zero Trust access.
    Top operational benefits such as reduced admin time and staff to provision network access.
    Improved user experience/satisfaction and diminished trouble tickets.
    Industry-specific case studies on how Appgate is used to achieve Zero Trust.
  • What's the Real Economic Value of Zero Trust? Recorded: Sep 15 2021 56 mins
    Johna Til Johnson – CEO and Founder, Nemertes. John Burke – CTO, Nemertes. Jason Garbis – Chief Product Officer, Appgate
    Did you know that Zero Trust Network Access (ZTNA) is a catalyst for cloud migration, digital transformation and operational efficiencies? If ZTNA is on your cyber strategy wish list—or you use it for remote access and want to speed your Zero Trust security across your organization—then this session’s for you.

    Dive into quantifiable benefits as reported in the Nemertes Real Economic Value study on Appgate SDP, an industry-leading ZTNA solution. We’ll cover:

    The strategic advantages of using a software-defined perimeter architecture for Zero Trust access.
    Top operational benefits such as reduced admin time and staff to provision network access.
    Improved user experience/satisfaction and diminished trouble tickets.
    Industry-specific case studies on how Appgate is used to achieve Zero Trust.
  • Unleash Digital Transformation with Zero Trust Security Recorded: Sep 9 2021 58 mins
    Jason Garbis – Chief Product Officer at Appgate, and Tom Ragsdale – Director of Security Solutions at Lumen
    Security should be an enabler, not an impediment—but this is a foreign concept to most enterprise organizations. That’s why Zero Trust represents such a paradigm shift in how we secure network access. Once you embrace the principles of Zero Trust , you can then unleash its transformative powers.

    In this joint webinar with CenturyLink, we discuss how Zero Trust can unlock digital transformation efforts while strengthening your security posture.

    We’ll cover:
    o The pillars of a secure digital business
    o Why legacy network security solutions need reconsidering
    o How Zero Trust and a Software-Defined Perimeter architecture unleash transformation potential
  • Four Steps to Secure Access in 2021 Recorded: Sep 2 2021 50 mins
    Dr. Chase Cunningham, former Principal Analyst at Forrester, and Brigadier General Greg Touhill
    Some of the biggest security blunders of 2020 were tied to the exploitation of VPNs. The limitations of this 25-year-old technology were exposed just as global mass remote workforce initiatives reached a fevered pitch. VPNs are not fit for purpose in a world where secure access is more important than ever.

    Watch our webinar to explore the four main pillars that are essential to the building and execution of a superior remote access strategy:
    1.Confront your VPN
    2.Develop your Roadmap
    3.Enforce Zero Trust Access
    4.Unleash Operations
  • Building Blocks for Your Zero Trust Journey Recorded: Aug 26 2021 60 mins
    Jason Garbis, Chief Product Officer at Appgate and Jerry Chapman, Technical Director at Optiv
    Zero Trust can break down silos and transform your organization’s security posture, but knowing where to start can be challenging. This webinar will show you how to take the first steps to achieving Zero Trust. It starts with a Software-Defined Perimeter (SDP) solution that simplifies and strengthens access controls—and that’s just the beginning of the journey.

    We’ll cover:
    •An introduction to Zero Trust’s core concepts
    •What a typical enterprise Zero Trust journey looks like
    •How people, devices, networks, and workloads play into the Zero Trust paradigm
    •Why a Software-Defined Perimeter (SDP) is the proven approach to Zero Trust
  • ZTNA for the Post-Pandemic Hybrid Workforce Recorded: Aug 10 2021 59 mins
    Garrett Bekker Senior Research Analyst, Information Security 451 Research and Jason Garbis Chief Product Officer, Appgate
    Zero Trust Network Access adoption spiked in 2020 as organizations scrambled to solve an unprecedented remote access challenge. Now, looking ahead, enterprises are faced with the conundrum of staying fully remote, returning full-time to the workplace, or more likely landing somewhere in between. But not all ZTNA solutions are created equal, and many are ill-suited to address a range of use cases or environments. Learn how a fully-adaptive ZTNA solution can allow your network access strategy to adapt with the times and secure your modern workforce for both today and tomorrow

    Join this roundtable discussion to:

    Understand the limitations of remote access-only solutions
    Prevent policy complexity for hybrid remote and on-site access models
    Get guidance on building a unified network access architecture
    Explore a wide variety of use cases that can be addressed by ZTNA
    Avoid the pitfalls of deploying a ZTNA solution
  • Identity-Centric Security: The Zero Trust Perspective Recorded: Aug 6 2021 53 mins
    Jason Garbis, Chief Product Officer
    In this session we explore the limitations of traditional security architectures, and explain how Zero Trust is best achieved with a new, open, and identity-centric model – the Software-Defined Perimeter (SDP) – which can significantly improve enterprise security, and finally let organizations bridge the gap between identity and network security. SDP verifies and secures all access to all resources, strictly limits network access, and literally makes network resources invisible to unauthorized users. We’ll explain how SDP avoids the limitations of traditional security architectures, delivers fine-grained network access control in a way that’s tied to each user’s context, and is dynamically responsive to changes in enterprise environments. We’ll conclude with an enterprise case study, showing how one organization obtained technical, business, and compliance benefits.

    After this presentation, attendees will:
    - Understand the core principles of Zero Trust security, and why it’s important to adopt them now
    - How enterprises can achieve Zero Trust via a Software-Defined Perimeter architecture
    - See a customer case study of how they’ve used this approach to obtain significant business, technical, and security benefits in the cloud
    - Understand the ways in which their organization can quickly begin a Zero Trust journey, integrating with and enhancing their existing IT and Security infrastructure
  • Zero Trust: This is the Way Recorded: Jun 15 2021 60 mins
    Jason Garbis, Chief Product Officer at Appgate, and David Holmes, Senior Analyst at Forrester
    The SolarWinds hack shook InfoSec leaders to the core. They’re increasingly asking the question: “If we had a Zero Trust security strategy in place, would it have stopped the breach?”

    This webinar dives deeper into the attack and key learnings. If there’s one thing that’s certain—it’s that Zero Trust principles have never been more necessary than they are right now.

    Webinar was originally released on May 4th

    We cover:
    • SolarWinds Attack Implications
    • How to Better Protect Your Organization
    • Why Zero Trust is Worth the Investment
  • Introducing Zero Trust Security: An Enterprise Guide Recorded: Apr 27 2021 56 mins
    Jason Garbis, Brigadier General (Ret.) Greg Touhill, and Tom Field
    Zero Trust is a major industry trend that fundamentally changes the underlying methodology of enterprise security … moving from outdated and demonstrably ineffective perimeter-centric methods to a dynamic, identity-centric, policy-based approach.

    Join Jason Garbis, author of the newly released book, Introducing Zero Trust: An Enterprise Guide, for an energetic discussion with leading Zero Trust experts to get insights on:

    • The origins of Zero Trust security
    • The biggest misperceptions of Zero Trust
    • How Zero Trust is evolving
    • What are the next advancements in Zero Trust?
  • How to Reduce Your Attack Surface with Zero Trust Recorded: Apr 27 2021 55 mins
    Jason Garbis, Author of Zero Trust Security Guide at Appgate, and Aaron Palermo, Co-author of SDP Architecture Guide at Optiv
    It’s getting complicated out there! Mobile workforces, hybrid IT architectures and device proliferation compound the ever-growing risks associated with securing your corporate network.

    Experts from Appgate and Optiv Security reveal how Zero Trust security handles the challenges of sprawling IT in order to reduce your attack surface, stop unsanctioned lateral movement and minimize the risk of breaches.

    Listen in to learn about the fundamentals you need to become a smaller target, including how to:

    • Protect from the edge to your largest attack surface – people
    • Make your infrastructure and workloads invisible
    • Extend Zero Trust to connected devices
    • Prevent lateral movement
  • Four Steps to Secure Access in 2021 Recorded: Mar 8 2021 50 mins
    Dr. Chase Cunningham, former Principal Analyst at Forrester, and Brigadier General Greg Touhill
    Some of the biggest security blunders of 2020 were tied to the exploitation of VPNs. The limitations of this 25-year-old technology were exposed just as global mass remote workforce initiatives reached a fevered pitch. VPNs are not fit for purpose in a world where secure access is more important than ever.

    Watch our webinar to explore the four main pillars that are essential to the building and execution of a superior remote access strategy:
    1.Confront your VPN
    2.Develop your Roadmap
    3.Enforce Zero Trust Access
    4.Unleash Operations
  • Jumpstart Your Zero Trust Roadmap Ft. Forrester Recorded: Feb 10 2021 51 mins
    Jason Garbis, SVP of Product Management at Appgate and Dr. Chase Cunningham, VP Principal Analyst at Forrester
    Cybercriminals love the outdated “trust but verify” security model, because its vulnerability makes their exploits easy. Fortunately, a better approach is out there. The Zero Trust architecture shifts your security toward a “never trust, extensively verify” mindset—it’s the clear next step in achieving secure network access.

    However, achieving Zero Trust is not a simple one-and-done project. To truly reap the benefits of Zero Trust, your enterprise must implement a range of security protocols and strategies. This takes time to accomplish and figuring out those first steps to success can be difficult.

    This on-demand webinar covers everything you need to jumpstart your Zero Trust journey:
    •Making the case for Zero Trust
    •How to plot your journey
    •Why achieving Zero Trust starts with secure access
    •Understanding the NIST Zero Trust architecture
    •Exploring Zero Trust case studies
  • Building Blocks for Your Zero Trust Journey Recorded: Feb 5 2021 60 mins
    Jason Garbis, Chief Product Officer at Appgate and Jerry Chapman, Technical Director at Optiv
    Zero Trust can break down silos and transform your organization’s security posture, but knowing where to start can be challenging. This webinar will show you how to take the first steps to achieving Zero Trust. It starts with a Software-Defined Perimeter (SDP) solution that simplifies and strengthens access controls—and that’s just the beginning of the journey.

    We’ll cover:
    •An introduction to Zero Trust’s core concepts
    •What a typical enterprise Zero Trust journey looks like
    •How people, devices, networks, and workloads play into the Zero Trust paradigm
    •Why a Software-Defined Perimeter (SDP) is the proven approach to Zero Trust
  • How to Achieve Zero Trust in 2021 Ft. Forrester Recorded: Jan 29 2021 58 mins
    Former Forrester analyst Dr. Cunningham, Jason Garbis – Appgate, Jalon Zimmerman – Secureworks, Jeremy Oddo – Third Floor
    2020 finally obliterated the perimeter, reinforcing the need for Zero Trust access. Homes became satellite offices overnight, which broke standard security protocols and forced companies to re-evaluate their network access strategies.

    Now, months after that disruption, it’s clear those sudden changes are not going away. Remote work is here to stay, but legacy network security architectures are unable to secure and support the new reality. It’s time to replace a failing old models and solutions with Zero Trust network access.

    Watch our expert roundtable discussion for valuable insights and recommendations for embarking on your Zero Trust journey in 2021.
  • Unleash Digital Transformation with Zero Trust Security Recorded: Jan 29 2021 58 mins
    Jason Garbis – Chief Product Officer at Appgate, and Tom Ragsdale – Director of Security Solutions at Lumen
    Security should be an enabler, not an impediment—but this is a foreign concept to most enterprise organizations. That’s why Zero Trust represents such a paradigm shift in how we secure network access. Once you embrace the principles of Zero Trust , you can then unleash its transformative powers.

    In this joint webinar with CenturyLink, we discuss how Zero Trust can unlock digital transformation efforts while strengthening your security posture.

    We’ll cover:
    o The pillars of a secure digital business
    o Why legacy network security solutions need reconsidering
    o How Zero Trust and a Software-Defined Perimeter architecture unleash transformation potential
  • VPN vs SDP: Live Hack Demo Recorded: Jan 29 2021 40 mins
    Jim Anthony, VP of Cybersecurity at Appgate, and Neil Christie, Director of Cybersecurity Solutions Architecture at SageNet
    VPNs used to be the obvious choice for ensuring secure remote access. However, traditional VPNs no longer provide the security, performance and access control needed to effectively secure your enterprise. Organizations who understand the limitations of VPNs are switching to a Software-Defined Perimeter (SDP), because it exceeds their modern remote access needs and sets them on a clear path toward Zero Trust.

    Watch our webinar for an in-depth explanation of the architectural differences between VPN and SDP, and discover why enterprises are now seeking out robust SDP solutions to secure their data.
  • Simplify Secure Access in 2021 – Expert Roundtable Recorded: Jan 29 2021 56 mins
    Scott Crawford at 451 Research, Jason Garbis at Appgate, and Leo Taddero at Cyxtera Federal Group
    There’s no question that IT and access management is evolving—but its recent pace has been staggering. Pre-pandemic, many organizations were taking a long-term approach to implementing Zero Trust network access solutions, but a dramatic increase in remote work forced immediate change. As we move into 2021, organizations have an opportunity to regroup and determine how they can strengthen and simplify their network security architectures across the enterprise.

    Join our roundtable of experts as they address how organizations can simplify network security and streamline secure access. Our experts discuss:
    •The current state of IT and its trajectory
    •How the sudden shift to remote work became a catalyst for change
    •Exploring the ways organizations can modernize their secure access approach
Secure Access, with Confidence
Make sure the right people can access the right resources – and nothing more. With Appgate secure access solutions you can enable your digital business with a security strategy that reduces risk, removes complexity and instills the confidence needed to move forward.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Four Steps to Secure Access in 2021
  • Live at: Sep 2 2021 4:00 pm
  • Presented by: Dr. Chase Cunningham, former Principal Analyst at Forrester, and Brigadier General Greg Touhill
  • From:
Your email has been sent.
or close