Zero Trust Security: A Bridge to the Cloud

Logo
Presented by

Jason Garbis, Senior Vice President of Products, AppGate

About this talk

Zero Trust security represents a transformation of security principles, technology, and processes which can effectively address today’s IT and threat landscape, and help organizations securely embrace the cloud. Zero Trust not only overcomes the shortcomings of traditional security tools and technologies, it provides a unified policy model and set of enforcement points across a heterogeneous technology landscape. This is important, because cloud environments, for all their power and promise, do utilize a different set of security technologies, tools, and models compared with the traditional on-premises infrastructure. While there are often very compelling business and technology drivers to adopt the cloud, from a security perspective these changes bring with them a new set of challenges. The good news is that a Zero Trust approach – utilizing the open, modern Software-Defined Perimeter (SDP) security architecture – is entirely achievable, and brings enormous security and operational benefits. As such, not only can embracing Zero Trust improve enterprise security, it can act as a secure bridge to the cloud. In this session, we’ll define Zero Trust as a set of principles, and explain how the Software-Defined Perimeter - which verifies and secures all access to all resources, and strictly limits network access – avoids the limitations of traditional security We’ll explain how an SDP implementation delivers fine-grained network access control, in a way that’s tied to each user’s context, and is dynamically responsive to changes in Cloud environments. We’ll make this concrete with a customer case study, showing how one enterprise obtained technical, business, and compliance benefits from deploying this solution as part of their Cloud migration.
Related topics:

More from this channel

Upcoming talks (9)
On-demand talks (708)
Subscribers (198873)
This channel features presentations by leading experts in the field of information security. From application, computer, network and Internet security to access control management, data privacy and other hot topics, you will walk away with practical advice for your strategic and tactical information security initiatives.