Identity Centric approach to Zero Trust
Going Beyond Perimeter Security
Get an Alertwhen The Register has something new about ...
Check the boxes & select Email or Atom/RSS Feed.
The ‘Zero Trust’ security emphasises that enterprises should have a “trusted” internal network and an “untrusted” external network. The adoption of increasing mobile and cloud and the recent pandemic shows that we can no longer have a network perimeter-centric view of security. Instead, we need to securely enable access for the various stakeholders, including employees, partners, contractors, etc., regardless of their location, device, or network.
There is no silver bullet in achieving a ‘Zero Trust’ security architecture. Still, the identity and access management is the core technology that sets the stage for the ‘zero trust’ journey. The ‘people’ become the new perimeter in this journey, with identity-forming the critical component to establishing a secure environment.
The Register's Simon Sharwood will be joined by Karunanand Menon of Okta, APAC and Harry Wong of Deloitte Touche Tohmatsu will discuss:
- The shifts in the security landscape that paved the way for ‘Zero Trust’
- How the ‘zero trust’ extended ecosystem will look like today
- Building an effective ‘zero trust’ program and architecture for the future
You will have to register, or log in, in order to view this webinar.