|Date:||Wednesday, April 18, 2018|
|Time:||1:00 pm ET / 10:00 am PT|
|Title:||A Trust Model for Multi-Cloud Networks and Applications Beyond Zero Trust|
|Sponsored By:||Pulse Secure|
Pulse Secure 2018 Next-Gen Data Center Networking Report Webinar
IT organizations are transitioning from traditional data center networks to hybrid and multi-cloud environments for all of their business and enterprise applications. To support that transformation, we need a more consistent model for secure access to networks, so that employees and partners can transition seamlessly from one application to another across these different environments. As a result, we are seeing a corresponding move to new security and trust models to connect people, devices and applications across these new networks. We no longer have simple boundaries, with secure perimeter protection to mark the border between distinct trust domains.
In such perimeter-less multi-cloud environment, taking a zero-trust approach (trust nothing and no-one) to network and application security seems straightforward and appealing at first. However, the burden of “never trust and always verify” implies explicit check and re-authorizations at local boundaries. There has been great progress with initiatives such as SDP and CASB, but these are not enough by themselves: we need a way to incorporate the best technologies, flexible to extend to new concepts, and integrates with multiple vendors.
So how do we structure a trust and secure access model that incorporates the good aspects of zero trust? How can we maximize collaboration and enable dynamic access anytime, anywhere, all with a basis of established levels of lasting trust?
In this webinar, Rob Koeten introduces a new way to think about security and access, which extends beyond the network to people, devices, applications – how an organization interacts with their networks as a whole, and how we can define security relationships which will transcend our networks.
Register for this webinar and learn about the importance of:
- Trust as a core principle of a Secure Access Architecture
- Key relationships between People, Identity and Information
- Secure connections between Applications and Networks and Devices
- Orchestration and Automation of policies and workflows