Zero Trust Reality Check: Secure Access for Hybrid IT
- LANGUAGE: English DATE: Thursday, November 15, 2018 TIME: 4:00pm CET, 10:00am EST, 7:00am PST
Workforce mobility and widespread adoption of distributed data center and cloud environments have introduced significant access control complexities and threats. Organizations are questioning the efficacy of conventional, perimeter-based defenses and are now evaluating a “trust but verify” model. What are key enterprise considerations when deploying Zero Trust to enable seamless access, ensure business compliance and mitigate risk?
While consumers are getting desensitized to the incessant news of a given data breach and millions of identities lost to the dark web, enterprises face increased industry, regulatory and boardroom pressure to bolster their data protection measures. At an average loss of $4,000,000 USD per breach and potential fines upwards of 4% of gross revenue, progressing access security is among the top ten CIO initiatives.
The traditional fortress model with perimeter and layered defenses can no longer be relied upon in a world of sophisticated attacks and threat actors given the dynamics of a modern workforce, mobile and distributed apps, and virtualization across network and multi-cloud infrastructure. Enterprises can no longer afford “connect, authenticate, and then access” visibility and control gaps. The Zero Trust offers a compelling alternative by establishing trust through authenticated users and devices and securing connectivity directly to the application and resource.
This webinar provides a pragmatic deep-dive into the world of Zero Trust and explores the advantages, nuances and technologies behind Secure Access and Software Defined Perimeter (SDP).
Join experts from KuppingerCole and Pulse Secure as they share:
- Where IT consumerization, virtualization and multi-cloud impacts access
- The interest, reasoning and mechanics beyond the Zero Trust adoption
- Why modern applications and usage must accommodate multi-trust models
- Assessing Zero Trust readiness and determining targeted implementation
- A flexible reference architecture for hybrid IT secure access
In the first part of this webinar, Mike Small, Senior Analyst at KuppingerCole, will describe the drivers, and principles of Zero Trust access security and the importance of a zero-trust approach to the multi-cloud hybrid environment.
In the second part, James Gonsalves, Director of Product Management at Pulse Secure, will examine trust model scenarios, protection mechanisms, and critical deployment considerations to ensure hybrid IT access usability, intelligence and control.
Pulse Secure, LLC offers easy, comprehensive Secure Access solutions that provide visibility and seamless, protected connectivity between users, devices, things and services. The company delivers suites that uniquely integrate cloud, mobile, application and network access to enable hybrid IT. More than 20,000 enterprises and service providers across every vertical entrust Pulse Secure to empower their mobile workforce to securely access applications and information in the data center and cloud while ensuring business compliance.
As users, devices and application workloads move outside the corporate network, the traditional model of enforcing security at the network perimeter is no longer effective. A Zero Trust model offers an alternative that secures data while ensuring it is accessible to employees, regardless of where they are working. But the path to achieving Zero Trust is unclear for many organizations.