Zero Trust for the Workforce
- LANGUAGE: English DATE: Tuesday, December 01, 2020 TIME: 4:00pm CET, 10:00am EST, 7:00am PST
While the concept of zero-trust networking is nearly a decade old, the last few years have seen its popularity in industry discussions grow exponentially.
While zero-trust strategies can benefit businesses of every size, this popularity presents a challenge as well: like most trending topics in security, it quickly becomes difficult to sort the useful facts and practices from the sensationalist marketing and media. So where do you start when planning your organization’s zero-trust strategy?
Join this webinar and learn more about
- The current challenges driving a need for zero-trust networking
- How to introduce zero-trust strategies into a traditional parameterized environment
- The business benefits of a Zero-Trust architecture
- The top questions executives should ask when beginning their zero-trust journey
Paul Simmonds, Fellow Analyst at KuppingerCole, will discuss challenges that necessitate implementation of zero trust infrastructures.
He will be joined by Richard Archdeacon, Advisory CISO EMEA at Duo Security will explain how to go about the implementation process and highlight business benefits.
Duo Security, now part of Cisco, is the leading multi-factor authentication (MFA) and Zero Trust for the Workforce provider. Duo's zero-trust security platform, Duo Beyond, enables organizations to provide secure access to all of their critical applications - for any user, from anywhere, and with any device. Duo is a trusted partner to more than 21,000 customers globally, including Dresser-Rand, Etsy, Facebook, Paramount Pictures, Random House, Zillow and more. Founded in Ann Arbor, Michigan, Duo has offices in growing hubs in Detroit; Austin, Texas; San Francisco, California; and London. Visit Duo.com to find out more.
Mit zunehmender Digitalisierung und der Nutzung von Cloud-Services steigt das Angriffspotenzial auf die digitale Infrastruktur von Unternehmen. Hacker nutzen neuste Technologien, um Schwachstellen ausfindig zu machen und starten mit diesem Wissen Ihre Angriffe.