Pulse Secure 2018 Next-Gen Data Center Networking Report Webinar
IT organizations are transitioning from traditional data center networks to hybrid and multi-cloud environments for all of their business and enterprise applications. To support that transformation, we need a more consistent model for secure access to networks, so that employees and partners can transition seamlessly from one application to another across these different environments. As a result, we are seeing a corresponding move to new security and trust models to connect people, devices and applications across these new networks. We no longer have simple boundaries, with secure perimeter protection to mark the border between distinct trust domains.
In such perimeter-less multi-cloud environment, taking a zero-trust approach (trust nothing and no-one) to network and application security seems straightforward and appealing at first. However, the burden of “never trust and always verify” implies explicit check and re-authorizations at local boundaries. There has been great progress with initiatives such as SDP and CASB, but these are not enough by themselves: we need a way to incorporate the best technologies, flexible to extend to new concepts, and integrates with multiple vendors.
So how do we structure a trust and secure access model that incorporates the good aspects of zero trust? How can we maximize collaboration and enable dynamic access anytime, anywhere, all with a basis of established levels of lasting trust?
In this webinar, Rob Koeten introduces a new way to think about security and access, which extends beyond the network to people, devices, applications – how an organization interacts with their networks as a whole, and how we can define security relationships which will transcend our networks.
Register for this webinar and learn about the importance of:
- Trust as a core principle of a Secure Access Architecture
- Key relationships between People, Identity and Information
- Secure connections between Applications and Networks and Devices
- Orchestration and Automation of policies and workflows
During the webinar, you'll learn:
- Establish a level of understanding about secure access in a multi-cloud environment
- The type of solutions that you choose needs to provide a consistent approach to trust-relationships
- Start by identifying the key relationships between People, Information and Applications on your network
Who should attend?
Industries: Service Provider (Managed Services), Service Provider (Cloud and Web), Media and Entertainment, Government (Federal) and Banking and Financial Services
Primary Roles: Executive, Developer, DevOps, Network Operator and Network Architect
Register for this webinar to discover a new way to think about security, one that extends beyond the network to people, devices, and applications – let’s analyze how organizations interact with their networks as a whole and define new ways of thinking about security trust-relationships that can ultimately transcend our networks.
Join SDxCentral and Pulse Secure on April 18, 2018 at 10:00 am for A Trust Model for Multi-Cloud Networks and Applications Beyond Zero Trust.
If you can't make it to the live event, register anyway. SDxCentral will let you know when the on-demand recording is available.