Zero Trust Reality Check: Secure Access for Hybrid IT

  • LANGUAGE: English DATE: Thursday, November 15, 2018 TIME: 4:00pm CET, 10:00am EST, 7:00am PST
Upcoming Webinars
Zero Trust Reality Check: Secure Access for Hybrid IT
Workforce mobility and widespread adoption of distributed data center and cloud environments have introduced significant access control complexities and threats. Organizations are questioning the efficacy of conventional, perimeter-based defenses and are now evaluating a “trust but verify” model. What are key enterprise considerations when deploying Zero Trust to enable seamless access, ensure business compliance and mitigate risk?

While consumers are getting desensitized to the incessant news of a given data breach and millions of identities lost to the dark web, enterprises face increased industry, regulatory and boardroom pressure to bolster their data protection measures. At an average loss of $4,000,000 USD per breach and potential fines upwards of 4% of gross revenue, progressing access security is among the top ten CIO initiatives.

The traditional fortress model with perimeter and layered defenses can no longer be relied upon in a world of sophisticated attacks and threat actors given the dynamics of a modern workforce, mobile and distributed apps, and virtualization across network and multi-cloud infrastructure. Enterprises can no longer afford “connect, authenticate, and then access” visibility and control gaps. The Zero Trust offers a compelling alternative by establishing trust through authenticated users and devices and securing connectivity directly to the application and resource.

This webinar provides a pragmatic deep-dive into the world of Zero Trust and explores the advantages, nuances and technologies behind Secure Access and Software Defined Perimeter (SDP).

Join experts from KuppingerCole and Pulse Secure as they share:

  • Where IT consumerization, virtualization and multi-cloud impacts access 
  • The interest, reasoning and mechanics beyond the Zero Trust adoption
  • Why modern applications and usage must accommodate multi-trust models
  • Assessing Zero Trust readiness and determining targeted implementation 
  • A flexible reference architecture for hybrid IT secure access 

In the first part of this webinar, Mike Small, Senior Analyst at KuppingerCole, will describe the drivers, and principles of Zero Trust access security and the importance of a zero-trust approach to the multi-cloud hybrid environment.

In the second part, James Gonsalves, Director of Product Management at Pulse Secure, will examine trust model scenarios, protection mechanisms, and critical deployment considerations to ensure hybrid IT access usability, intelligence and control.

Can’t attend the live session? Go ahead and register, and we’ll send you a link to the webcast recording

Speakers

James Gonsalves is Director of Product Management at Pulse Secure. With more than 15 years of IT and security experience, James brings a wealth of operational and technical expertise spanning network gateway, enterprise mobile management, cloud security, and enterprise access security. Prior to...


Lead Sponsor

Pulse Secure, LLC offers easy, comprehensive Secure Access solutions that provide visibility and seamless, protected connectivity between users, devices, things and services. The company delivers suites that uniquely integrate cloud, mobile, application and network access to enable hybrid IT. More than 20,000 enterprises and service providers across every vertical entrust Pulse Secure to empower their mobile workforce to securely access applications and information in the data center and cloud while ensuring business compliance.

Registration

Register now for free!

Information

Webinar

Zero Trust Reality Check: Secure Access for Hybrid IT

Language:
English
Contact person:

Mr. Levent Kara
+49 211 23707710
lk@kuppingercole.com
  • Nov 15, 2018 4:00pm CET, 10:00am EST, 7:00am PST

Popular Webcasts

Next Webinar

Webinar

Assuring and Implementing Cybersecurity and Data Protection for Public Clouds

Just a few years ago, IT infrastructures resembled medieval fortresses: Firewalls, intrusion prevention systems and anti-virus programs were supposed to ward off attacks even before the enemy could enter.

Next Conference

Conference

Consumer Identity World EUROPE 2018

The Consumer Identity World Tour is the place where you get input for your perfect CIAM Strategy. Learn more about Privacy by Design, Consent Life Cycle Management and the needs of your customers. Get to know how to secure their personal information in a strategic and user-friendly way.

Become a Sponsor

Call

+49 211 23707710
Mo – Fr 8:00 – 17:00