Discover a new way to think about security, one that extends beyond the network to people, devices, and applications – analyze how organizations interact with their networks as a whole and define new ways of thinking about security trust-relationships that can ultimately transcend our networks.
IT organizations are transitioning from traditional data center networks to hybrid and multi-cloud environments for all of their business and enterprise applications. To support that transformation, we need a more consistent model for secure access to networks, so that employees and partners can transition seamlessly from one application to another across these different environments. As a result, we are seeing a corresponding move to new security and trust models to connect people, devices and applications across these new networks. We no longer have simple boundaries, with secure perimeter protection to mark the border between distinct trust domains.
In such perimeter-less multi-cloud environment, taking a zero-trust approach (trust nothing and no-one) to network and application security seems straightforward and appealing at first. However, the burden of “never trust and always verify” implies explicit check and re-authorizations at local boundaries. There has been great progress with initiatives such as SDP and CASB, but these are not enough by themselves: we need a way to incorporate the best technologies, flexible to extend to new concepts, and integrates with multiple vendors.
So how do we structure a trust and secure access model that incorporates the good aspects of zero trust? How can we maximize collaboration and enable dynamic access anytime, anywhere, all with a basis of established levels of lasting trust?
In this webinar, Rob Koeten, Chief Software Architect at Pulse Secure, introduces a new way to think about security and access, which extends beyond the network to people, devices, applications – how an organization interacts with their networks as a whole, and how we can define security relationships which will transcend our networks.
Learn about the importance of:
By clicking the links above, I consent to share my contact information with the sponsor(s) of this content.