Zero Trust for the Workforce
- LANGUAGE: English DATE: Tuesday, December 01, 2020 TIME: 4:00pm CET, 10:00am EST, 7:00am PST
While the concept of zero-trust networking is nearly a decade old, the last few years have seen its popularity in industry discussions grow exponentially.
While zero-trust strategies can benefit businesses of every size, this popularity presents a challenge as well: like most trending topics in security, it quickly becomes difficult to sort the useful facts and practices from the sensationalist marketing and media. So where do you start when planning your organization’s zero-trust strategy?
Join this webinar and learn more about
- The current challenges driving a need for zero-trust networking
- How to introduce zero-trust strategies into a traditional parameterized environment
- The business benefits of a Zero-Trust architecture
- The top questions executives should ask when beginning their zero-trust journey
Paul Simmonds, Fellow Analyst at KuppingerCole, will discuss challenges that necessitate implementation of zero trust infrastructures.
He will be joined by Richard Archdeacon, Advisory CISO EMEA at Duo Security will explain how to go about the implementation process and highlight business benefits.
Duo Security, now part of Cisco, is the leading multi-factor authentication (MFA) and Zero Trust for the Workforce provider. Duo's zero-trust security platform, Duo Beyond, enables organizations to provide secure access to all of their critical applications - for any user, from anywhere, and with any device. Duo is a trusted partner to more than 21,000 customers globally, including Dresser-Rand, Etsy, Facebook, Paramount Pictures, Random House, Zillow and more. Founded in Ann Arbor, Michigan, Duo has offices in growing hubs in Detroit; Austin, Texas; San Francisco, California; and London. Visit Duo.com to find out more
Today’s IT environments blend applications and services from multiple public cloud networks, private clouds and on-prem networks, making it difficult to view and inventory assets deployed across complex hybrid networks, and keep track of the security risks. Organizations need to find a way to improve visibility, identify and prioritize risks, and maintain cyber resiliency.