How to Achieve Zero Trust in Your Access Management Strategy

Logo
Presented by

Sol Cates Principal Technologist, CTO Office Thales, Bryan Green BISO Salesforce, John Kindervag Field CTO Palo Alto Networks

About this talk

Zero Trust approaches to security are at the core of key strategic IT initiatives, including cloud and digital transformation. Underlying Zero Trust assumptions rely on a "trust no one, verify everyone" approach, whereby the network, devices, and identities—whether internal or external—should always be assumed to be at risk. A key tenet in this approach is that every device, user, and network flow is authenticated and authorized.
Related topics:

More from this channel

Upcoming talks (1)
On-demand talks (625)
Subscribers (80368)
Thales is a global leader in cybersecurity, helping the most trusted companies, organizations and governments around the world protect critical applications, sensitive data, and identities anywhere at scale. Through our innovative services and integrated platforms, Thales helps customers achieve better visibility of risks, defend against cyber threats, close compliance gaps, and deliver trusted digital experiences for billions of consumers every day.