KCLive on Identity Fabrics

Technological Approaches to a Zero Trust Security Model

The webinar took place on Tuesday, June 16, 2021
Webinar Presentation John Tolbert
Webinar Presentation Richard Meeus

Watch the Recording

Join this webinar to:

  • Understand how best to approach implementing Zero Trust.
  • Explore the technological considerations and options available.
  • Learn how to create a smarter way for users to access applications.
  • Discover effective ways to protect users from cyber threats.
  • Learn how to deliver a phish-proof MFA strategy.
  • Get answers to your questions about Zero Trust.

Which technologies to consider and why

The traditional model of enforcing security at the network perimeter is no longer valid as employees, devices and workloads move outside the corporate network. A Zero Trust model offers an alternative that secures data while ensuring it is accessible from wherever employees are working. But finding the right technological approaches to Zero Trust is challenging.

Join John Tolbert, Lead Analyst at KuppingerCole and Richard Meeus, EMEA director of security technology and strategy at Akamai as they discuss the benefits and challenges of authentication and authorization for every session in your environment on-prem and in the cloud, examine the technological options, and answer your questions.

Speakers Contribution

Cybersecurity expert and industry veteran John Tolbert will share his perspective on the Zero Trust approach to security, focusing on the main technological approaches and kinds of authentication available. He will also highlight what kinds of risk factors need to be evaluated, and how they can be used for policies that enforce Zero Trust.

Responsible for Akamai security thought leadership in EMEA, Richard Meeus will discuss the importance and benefits of MFA and the FIDO2 specification, and how organizations can move to a least-privilege application access model, get proactive protection against zero-day malware, and eliminate traditional VPNs.

 Never Miss Another Webinar

Enter your email to subscribe:

Background: John Tolbert is a Lead Analyst and Managing Director of KuppingerCole, Inc (US). As Lead Analyst, John covers a number of different research areas, outlined below. John also advises cybersecurity and IAM vendors, from startups to Fortune 500 companies, regarding their product and...

Lead Sponsor


Join this combined presentation to gain quick insights and hands-on solutions from a KuppingerCole analyst and selected industry expert, finishing with by a comprehensive Q&A for your individual business challenges.

To register for the webinar, you need to log in to your KuppingerCole User first. If you do not have a KuppingerCole User yet, you can sign up here. After logging in, please enter your requested personal data which is necessary for the further administration of your registration. Once registered, a booking confirmation will be sent to your indicated email address.

Our webinars last approximately 50-60 minutes.

If you didn’t receive the booking confirmation in your inbox, please check your spam folder. If you cannot find the booking confirmation in your spam folder, please contact us. We will get back to you within one business day.

We use the "GoToWebinar" software for the webinars. Simply click on "Join the webinar" in the registration confirmation. GoToWebinar will check directly on your computer if the software is already installed. If not, the installation process will start automatically, and you only need to confirm it.

To participate, you need a computer or a laptop with Internet access. If you want to use the sound transmission via the computer, you will need headphones (headset) or speakers. You do not need a webcam or microphone. A combination of computer and telephone is also possible - you then follow the webinar via your Internet connection on the computer and dial in at the same time via telephone to listen to the moderator's explanations. You can type in questions in the chat window. In the registration confirmation you will also receive a link that allows you to test the technical requirements in advance.

Our webinars are generally free of charge.

The recordings and presentation slides will be available on the website shortly after the webinar. An email will be sent to all registered users. In order to access the materials, you will need to log in to your KuppingerCole User first.

Yes, the recordings and presentation slides are made available to all users that registered for the webinar, regardless if they attended live or were tied up with business. You do not need to deregister.

In some companies there are - mostly due to restrictive IT policies - problems with the installation. We regret this, of course, but cannot provide support in these cases. But no problem: You will receive the recording after the webinar, which you can watch in a normal web browser.