Your Zero Trust Roadmap: Five Steps to Securing User Access to Applications

Logo
Presented by

J. Wolfgang Goerlich, Advisory CISO; Sandy Hawke, Sr. PMM for Zero Trust

About this talk

Zero trust conversations have evolved very quickly. Organizations of all sizes now know the value of zero trust in terms of improving user experience and enabling business transformation. Teams no longer ask ‘what is it’ but now want to know ‘where do I start and what do I do next’. Specifically, which capabilities to prioritize when rolling out zero trust access for users (employees and contractors) and their devices (managed and unmanaged). In a nutshell, organizations need a roadmap. Join us as we dig into key data from our Cisco Zero Trust Workshops and our solution guide “How to go from MFA to zero trust: A five-phase plan for securing user and device access to applications”. These resources guide our customers in implementing zero trust for securing user access to applications – wherever users are, using different types of devices, and wherever the apps reside.
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (102)
Subscribers (20213)
Duo is a cloud-based security platform that protects access to all applications, for any user and device, from anywhere. It’s designed to be both easy to use and deploy, while providing complete endpoint visibility and control. Duo verifies users' identities with strong multi-factor authentication. Paired with deep insights into your users’ devices, Duo gives you the policies and control you need to limit access based on endpoint or user risk. Users get a consistent login experience with Duo's single sign-on that delivers centralized access to both on-premises and cloud applications. With Duo, you can protect against compromised credentials and risky devices, as well as unwanted access to your applications and data. This combination of user and device trust builds a strong foundation for a zero-trust security model.