Zero Trust Reality Check: Secure Access for Hybrid IT

  • LANGUAGE: English DATE: Thursday, November 15, 2018 TIME: 4:00pm CET, 10:00am EST, 7:00am PST
Upcoming Webinars
Zero Trust Reality Check: Secure Access for Hybrid IT

Workforce mobility and widespread adoption of distributed data center and cloud environments have introduced significant access control complexities and threats. Organizations are questioning the efficacy of conventional, perimeter-based defenses and are now evaluating a “trust but verify” model. What are key enterprise considerations when deploying Zero Trust to enable seamless access, ensure business compliance and mitigate risk?

While consumers are getting desensitized to the incessant news of a given data breach and millions of identities lost to the dark web, enterprises face increased industry, regulatory and boardroom pressure to bolster their data protection measures. At an average loss of $4,000,000 USD per breach and potential fines upwards of 4% of gross revenue, progressing access security is among the top ten CIO initiatives.

The traditional fortress model with perimeter and layered defenses can no longer be relied upon in a world of sophisticated attacks and threat actors given the dynamics of a modern workforce, mobile and distributed apps, and virtualization across network and multi-cloud infrastructure. Enterprises can no longer afford “connect, authenticate, and then access” visibility and control gaps. The Zero Trust offers a compelling alternative by establishing trust through authenticated users and devices and securing connectivity directly to the application and resource.

This webinar provides a pragmatic deep-dive into the world of Zero Trust and explores the advantages, nuances and technologies behind Secure Access and Software Defined Perimeter (SDP).

Join experts from KuppingerCole and Pulse Secure as they share:

  • Where IT consumerization, virtualization and multi-cloud impacts access 
  • The interest, reasoning and mechanics beyond the Zero Trust adoption
  • Why modern applications and usage must accommodate multi-trust models
  • Assessing Zero Trust readiness and determining targeted implementation 
  • A flexible reference architecture for hybrid IT secure access 

In the first part of this webinar, Mike Small, Senior Analyst at KuppingerCole, will describe the drivers, and principles of Zero Trust access security and the importance of a zero-trust approach to the multi-cloud hybrid environment.

In the second part, James Gonsalves, Director of Product Management at Pulse Secure, will examine trust model scenarios, protection mechanisms, and critical deployment considerations to ensure hybrid IT access usability, intelligence and control.


James Gonsalves is Director of Product Management at Pulse Secure. With more than 15 years of IT and security experience, James brings a wealth of operational and technical expertise spanning network gateway, enterprise mobile management, cloud security, and enterprise access security. Prior to...

Lead Sponsor

Pulse Secure, LLC offers easy, comprehensive Secure Access solutions that provide visibility and seamless, protected connectivity between users, devices, things and services. The company delivers suites that uniquely integrate cloud, mobile, application and network access to enable hybrid IT. More than 20,000 enterprises and service providers across every vertical entrust Pulse Secure to empower their mobile workforce to securely access applications and information in the data center and cloud while ensuring business compliance.

Watch now


Webinar presentation, KuppingerCole

Webinar presentation, Pulse Secure

Webcast download

Popular Webcasts

Next Webinar


Protect, Detect, Respond, Mitigate: A Modern Security Paradigm for Modern Enterprises

The Antivirus has been proclaimed dead years ago – you’ve probably heard those stories many times. But did you realize that the EDR (Endpoint Detection and Response), which was once supposed to address all its shortcomings, isn’t doing well either? After all, with the sheer number and complexity of modern cyber threats, what’s the point of detecting each one if you have neither time nor qualified manpower to analyze and mitigate them before they turn into major disruptions?

Next Conference


European Identity & Cloud Conference 2021

Come to the place where the Digital Transformation is happening. The European Identity & Cloud Conference, held from May 12-15, 2020, offers a mixture of best practice discussions, visionary presentations, and networking opportunities with a future-oriented community. More than 800 thought leaders, leading vendors, analysts, executives, and end-users get together in Munich to be inspired by a list of world-class speakers.

Become a Sponsor


+49 211 23707710
Mo – Fr 8:00 – 17:00