Zero Trust Reality Check: Secure Access for Hybrid IT

  • LANGUAGE: English DATE: Thursday, November 15, 2018 TIME: 4:00pm CET, 10:00am EST, 7:00am PST
Upcoming Webinars
Zero Trust Reality Check: Secure Access for Hybrid IT

Workforce mobility and widespread adoption of distributed data center and cloud environments have introduced significant access control complexities and threats. Organizations are questioning the efficacy of conventional, perimeter-based defenses and are now evaluating a “trust but verify” model. What are key enterprise considerations when deploying Zero Trust to enable seamless access, ensure business compliance and mitigate risk?

While consumers are getting desensitized to the incessant news of a given data breach and millions of identities lost to the dark web, enterprises face increased industry, regulatory and boardroom pressure to bolster their data protection measures. At an average loss of $4,000,000 USD per breach and potential fines upwards of 4% of gross revenue, progressing access security is among the top ten CIO initiatives.

The traditional fortress model with perimeter and layered defenses can no longer be relied upon in a world of sophisticated attacks and threat actors given the dynamics of a modern workforce, mobile and distributed apps, and virtualization across network and multi-cloud infrastructure. Enterprises can no longer afford “connect, authenticate, and then access” visibility and control gaps. The Zero Trust offers a compelling alternative by establishing trust through authenticated users and devices and securing connectivity directly to the application and resource.

This webinar provides a pragmatic deep-dive into the world of Zero Trust and explores the advantages, nuances and technologies behind Secure Access and Software Defined Perimeter (SDP).

Join experts from KuppingerCole and Pulse Secure as they share:

  • Where IT consumerization, virtualization and multi-cloud impacts access 
  • The interest, reasoning and mechanics beyond the Zero Trust adoption
  • Why modern applications and usage must accommodate multi-trust models
  • Assessing Zero Trust readiness and determining targeted implementation 
  • A flexible reference architecture for hybrid IT secure access 

In the first part of this webinar, Mike Small, Senior Analyst at KuppingerCole, will describe the drivers, and principles of Zero Trust access security and the importance of a zero-trust approach to the multi-cloud hybrid environment.

In the second part, James Gonsalves, Director of Product Management at Pulse Secure, will examine trust model scenarios, protection mechanisms, and critical deployment considerations to ensure hybrid IT access usability, intelligence and control.


James Gonsalves is Director of Product Management at Pulse Secure. With more than 15 years of IT and security experience, James brings a wealth of operational and technical expertise spanning network gateway, enterprise mobile management, cloud security, and enterprise access security. Prior to...

Lead Sponsor

Pulse Secure, LLC offers easy, comprehensive Secure Access solutions that provide visibility and seamless, protected connectivity between users, devices, things and services. The company delivers suites that uniquely integrate cloud, mobile, application and network access to enable hybrid IT. More than 20,000 enterprises and service providers across every vertical entrust Pulse Secure to empower their mobile workforce to securely access applications and information in the data center and cloud while ensuring business compliance.

Watch now


Trending Videos

Next Webinar


Secure DevOps: Key to Software Supply Chain Security

In the modern world of flexible and remote working, it is useful for software engineers to be able to access and update source code from anywhere using any device, but the SolarWinds supply chain attack showed that it is essential to track every change for security and compliance reasons.

Become a Sponsor


+49 211 23707710
Mo – Fr 8:00 – 17:00