Zero Trust Through Dynamic Authorization and Policy Driven Access

Webinar
Zero Trust Through Dynamic Authorization and Policy Driven Access

Thursday, August 19, 2021 | 4:00pm CEST, 10:00am EDT, 7:00am PDT
Busy that time and day? Register anyway to watch the recording

Register Now

Join this webinar to:

  • Get a thorough understanding of the Zero Trust concept and its importance to the digital enterprise
  • Familiarize yourself with tools available to support Zero Trust
  • Understand the role of context-based dynamic authorization in Zero Trust
  • Discover how context-based authorization can help with compliance, security, and business growth
  • Gain insights from real-world implementations aimed at supporting Zero Trust
  • Get an overview of both Ericom’s RBI and ZTNA technologies as well as Axiomatics dynamic run-time Authorization platform

How authorization management enables Zero Trust in your cloud and application security strategy

As workers become more mobile and workloads move into the cloud, the traditional model of enforcing security at the network perimeter becomes ineffective. A Zero Trust model of strict access control for every user or device protects your organization from advanced security threats enabling you to stay connected, productive and secure.

Join experts from KuppingerCole Analysts, Ericom and Axiomatics for an interactive discussion on the role of fine-grained access controls in adopting Zero Trust and how best to address that challenge to meet the needs of a hybrid workforce using cloud-based applications and adopting new ways of working, such as DevOps.

Speakers Contribution

Richard Hill, Senior Analyst at KuppingerCole will share his perspective on the Zero Trust approach to security, adoption rates, and why it is important for the digital enterprise. He will also explain how Dynamic Authorization fits into a Zero Trust strategy and quiz the other webinar participants on their experience in this area.

Secure remote access expert and Chief Strategy Officer of Ericom, Chase Cunningham will be joined by Srijith Nair, Chief Strategy Officer and Jim Barkdoll, Chief Commercial Officer at Axiomatics to discuss how Dynamic Authorization and other technologies like Remote Browser Isolation (RBI) and Zero Trust Network Access (ZTNA) can be integrated into a Zero Trust approach.

 
 

 Never Miss Another Webinar

Enter your email to subscribe:

Jim Barkdoll is a data security veteran with a successful track record of helping enterprise customers solve challenges they face in protecting their critical assets.  As Chief Commercial Officer and President of Axiomatics, Jim meets regularly with business and technical leaders in global...

Richard Hill is Senior Analyst at KuppingerCole. He has 20 years of experience as an Identity & Access Management Solutions Architect, Systems Designer, and Engineer in the Aerospace, Manufacturing, and Social Networking industries. He is internationally known for his work on...

Dr. Srijith Nair is the Chief Strategy Officer at Axiomatics, responsible for developing and executing their growth strategies . Srijith brings great knowledge to the Axiomatics team, including a deep understanding of Identity and Access Management, cybersecurity and cloud security. He...

Lead Sponsor

         FAQ

Join this combined presentation to gain quick insights and hands-on solutions from a KuppingerCole analyst and selected industry expert, finishing with by a comprehensive Q&A for your individual business challenges.

To register for the webinar, you need to log in to your KuppingerCole User first. If you do not have a KuppingerCole User yet, you can sign up here. After logging in, please enter your requested personal data which is necessary for the further administration of your registration. Once registered, a booking confirmation will be sent to your indicated email address.

Our webinars last approximately 50-60 minutes.

If you didn’t receive the booking confirmation in your inbox, please check your spam folder. If you cannot find the booking confirmation in your spam folder, please contact us. We will get back to you within one business day.

We use the "GoToWebinar" software for the webinars. Simply click on "Join the webinar" in the registration confirmation. GoToWebinar will check directly on your computer if the software is already installed. If not, the installation process will start automatically, and you only need to confirm it.

To participate, you need a computer or a laptop with Internet access. If you want to use the sound transmission via the computer, you will need headphones (headset) or speakers. You do not need a webcam or microphone. A combination of computer and telephone is also possible - you then follow the webinar via your Internet connection on the computer and dial in at the same time via telephone to listen to the moderator's explanations. You can type in questions in the chat window. In the registration confirmation you will also receive a link that allows you to test the technical requirements in advance.

Our webinars are generally free of charge.

The recordings and presentation slides will be available on the website shortly after the webinar. An email will be sent to all registered users. In order to access the materials, you will need to log in to your KuppingerCole User first.

Yes, the recordings and presentation slides are made available to all users that registered for the webinar, regardless if they attended live or were tied up with business. You do not need to deregister.

In some companies there are - mostly due to restrictive IT policies - problems with the installation. We regret this, of course, but cannot provide support in these cases. But no problem: You will receive the recording after the webinar, which you can watch in a normal web browser.