Buying Into Zero Trust? What You Need to Consider to Be Successful

  • LANGUAGE: English DATE: Thursday, October 11, 2018 TIME: 4:00pm CEST, 10:00am EDT, 7:00am PDT
Upcoming Webinars
Buying Into Zero Trust? What You Need to Consider to Be Successful

As organizations take on the digital transformation, trends such as mobility, proliferation of SaaS applications and cloud infrastructure are driving up the number of connected entities and devices increasing the attack surface. With the spate of recent acquisitions in the market looking to change the way we approach security, we need to think beyond the technology and focus on the gaps we need to consider.

The Zero Trust paradigm is rapidly gaining popularity as a modern alternative to the traditional perimeter-based security, which can no longer provide sufficient protection against external and internal advanced cyberthreats. An IT infrastructure designed around this model treats every user, application or data source as untrusted and enforces strict security, access control and comprehensive auditing to ensure visibility and accountability of all user activities.

However, implementing the Zero Trust approach relies on a broad range of technologies and radically different organizational processes, so before buying into it, we need to consider the reality of what you need to be successful and the challenges it could present.

In this webinar, you will learn more about:

  • Use cases for adopting Zero Trust models and new challenges that arise with them;
  • How data classification gives you the ability to understand the level of risk and the level of trust to provide secure yet convenient access to sensitive data;
  • How to account for changes in behavior patterns such as Mergers and Acquisitions or End of Year financials;
  • Combining the controls for applications and data access in a way that complements a Zero Trust model.

In the first part of the webinar, KuppingerCole’s Lead Analyst Alexei Balaganski will present an overview and background of the Zero Trust approach. He’ll talk about the key factors in establishing trust and what affects it, including Identity Assurance, Behavior, and Risk.

In the second part, Stephen Mowll, Director Identity Governance & Lifecycle at RSA, will examine the key areas where Zero Trust looks to improve control and discuss what is really needed to achieve these benefits without compromising business convenience and agility.


Alexei is an analyst with specific focus on cybersecurity. His deep technical understanding allows him to support customers even with complex architectural and security challenges. Previously he has served as KuppingerCole's CTO. After graduating with an MSc degree in Mathematics and...

Stephen is an expert in Identity & Access Management for RSA and has over 15 years’ experience in Cyber Security. He has worked with many global organisations helping them to define their Identity and Access Management strategies and advise on Identity Management best practice. Prior...

Lead Sponsor

RSA® Business-Driven Security™ solutions provide organizations with a unified approach to managing digital risk that hinges on integrated visibility, automated insights and coordinated actions. With solutions for rapid detection and response, user access control, consumer fraud protection, and integrated risk management, RSA customers can thrive and continuously adapt to transformational change. For more information, visit 

Watch now


Webinar presentation, KuppingerCole

Webinar presentation, RSA

Video download

Popular Videos

Next Webinar


Endpoint Protection Made Easy With Privilege Management

Endpoint detection and response (EDR) solutions monitor endpoint and network events and record the information in a central database. There, the information is subjected to further analysis, detection, investigation, reporting, and alerting. While EDR solutions may be a good start to protect endpoints, they are by no means sufficient. Instead, Endpoint Privilege Management (EPM) solutions must be integrated to protect the systems from within.

Next Conference


European Identity & Cloud Conference 2021

Come to the place where the Digital Transformation is happening. The European Identity & Cloud Conference, held from May 12-15, 2020, offers a mixture of best practice discussions, visionary presentations, and networking opportunities with a future-oriented community. More than 800 thought leaders, leading vendors, analysts, executives, and end-users get together in Munich to be inspired by a list of world-class speakers.

Become a Sponsor


+49 211 23707710
Mo – Fr 8:00 – 17:00