In this TechTalk, "Decommissioning Access And Rule Cleanup", we will explain how to leverage Access Decommissioning Workflow for a controlled and documented removal of network access, and what is required to achieve it.
Join us on May 26 at 11am ET/4pm BST to learn how to gain the four layers of visibility and automation:
1. Decommissioning access that is obsolete or unauthorized
2. Visibility of all the rules implementing the access
3. Control which rules not to remove access from
4. Which devices, programs and workloads are running