InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Identity-Centric Security: The Zero Trust Perspective

Presented by

Jason Garbis, SVP of Products at Appgate

About this talk

In this session we explore the limitations of traditional security architectures, and explain how Zero Trust is best achieved with a new, open, and identity-centric model – the Software-Defined Perimeter (SDP) – which can significantly improve enterprise security, and finally let organizations bridge the gap between identity and network security. SDP verifies and secures all access to all resources, strictly limits network access, and literally makes network resources invisible to unauthorized users. We’ll explain how SDP avoids the limitations of traditional security architectures, delivers fine-grained network access control in a way that’s tied to each user’s context, and is dynamically responsive to changes in enterprise environments. We’ll conclude with an enterprise case study, showing how one organization obtained technical, business, and compliance benefits. After this presentation, attendees will: - Understand the core principles of Zero Trust security, and why it’s important to adopt them now - How enterprises can achieve Zero Trust via a Software-Defined Perimeter architecture - See a customer case study of how they’ve used this approach to obtain significant business, technical, and security benefits in the cloud - Understand the ways in which their organization can quickly begin a Zero Trust journey, integrating with and enhancing their existing IT and Security infrastructure
Information Security

Information Security

259770 subscribers736 talks
The latest trends and best practice advice from the leading experts
This channel features presentations by leading experts in the field of information security. From application, computer, network and Internet security to access control management, data privacy and other hot topics, you will walk away with practical advice for your strategic and tactical information security initiatives.
Related topics