Discover a new way to think about security, one that extends beyond the network to people, devices, and applications – analyze how organizations interact with their networks as a whole and define new ways of thinking about security trust-relationships that can ultimately transcend our networks.
IT organizations are transitioning from traditional data center networks to hybrid and multi-cloud environments for all of their business and enterprise applications. To support that transformation, we need a more consistent model for secure access to networks, so that employees and partners can transition seamlessly from one application to another across these different environments. As a result, we are seeing a corresponding move to new security and trust models to connect people, devices and applications across these new networks. We no longer have simple boundaries, with secure perimeter protection to mark the border between distinct trust domains.
In such perimeter-less multi-cloud environment, taking a zero-trust approach (trust nothing and no-one) to network and application security seems straightforward and appealing at first. However, the burden of “never trust and always verify” implies explicit check and re-authorizations at local boundaries. There has been great progress with initiatives such as SDP and CASB, but these are not enough by themselves: we need a way to incorporate the best technologies, flexible to extend to new concepts, and integrates with multiple vendors.
So how do we structure a trust and secure access model that incorporates the good aspects of zero trust? How can we maximize collaboration and enable dynamic access anytime, anywhere, all with a basis of established levels of lasting trust?
In this webinar, Rob Koeten, Chief Software Architect at Pulse Secure, introduces a new way to think about security and access, which extends beyond the network to people, devices, applications – how an organization interacts with their networks as a whole, and how we can define security relationships which will transcend our networks.
Learn about the importance of:
- Trust as a core principle of a Secure Access Architecture
- Key relationships between People, Identity and Information
- Secure connections between Applications and Networks and Devices
- Orchestration and Automation of policies and workflows
Disclaimer: Statements and opinions expressed in webinars and other related materials are those of the authors, presenter, and organizations they represent; and do not necessarily reflect the views or policies of SDxCentral, LLC or its publishers, editors, employees, members, partners, or sponsors.
SDxCentral, LLC makes no representation concerning and does not guarantee the source, originality, accuracy, completeness or reliability of any statement, information, data, finding, interpretation, advice, opinion, or view presented. SDxCentral will not be held responsible for any claim, loss, damage or inconvenience caused as a result of any information within this site, or any information accessed through this site.
Notice: Pursuant to the SDxCentral Terms of Service, by viewing or downloading sponsored content such as pdfs, podcasts or videos, or signing up for our webinars, you agree to allow SDxCentral to share your contact information with the sponsor.