Insights

Zero Trust

The Zero Trust paradigm focuses on eliminating implicit trust from IT architectures and enforcing strict identity verification and access controls for every user or device.

Zero Trust helps to redesign your cybersecurity architecture to function consistently and holistically across multiple IT environments and systems – and thus implementing Zero Trust properly will affect multiple existing and new security controls within your organization.

Guide
Guide
The Comprehensive Guide to Zero Trust Implementation
Read the full guide to learn how you can use Zero Trust to protect modern hybrid IT environments. Zero Trust applies to every aspect of an organization's processes.
Learn more
Webinar
Webinar
Shut the Door to Cyber Attackers Permanently
Stolen credentials are one of the easiest and most popular way for cyber criminals to gain access to targeted IT systems, but longer and stronger passwords together with first-generation...
Learn more
Blog
Blog
Ransomware Attacks on Critical Infrastructure
Ransomware is a very easy and successful way of making money illicitly, so it is a proven business model unlikely to lose popularity with cyber criminals any time soon. Cybercriminals are also...
Learn more
Whitepaper
Whitepaper
Considerations for Reducing the Risk of Ransomware
In this paper, we will expand our view of ransomware and demonstrate how treating it as an isolated security challenge is not a sustainable approach. We will show why prevention is the best...
Learn more
Event Recording
Event Recording
Risk-Based Cyber Reporting Best Practices
Cybersecurity reporting is a critical mechanism to ensure effective commincation of significant security issues across different levels of your organization - from software architects to the...
Learn more
Speeding Up Zero Trust Delivery Using Managed Services
Webinar Recording
Speeding Up Zero Trust Delivery Using Managed Services
Join security experts from KuppingerCole Analysts and iC Consult as they discuss how to combine a Zero Trust security model with IAM Managed Services to achieve an optimal cybersecurity posture...
Zero Trust Applied for Access Management - How to Control and Monitor the User Access
Event Recording
Zero Trust Applied for Access Management - How to Control and Monitor the User Access
UX with Security in Corporate and Customer Access but including a huge monitoring approach to have the effect of Zero Trust for the users. I will Mix CIAM, Access Management, IAG and UEBA
Zero Trust with Zero Buzz
Event Recording
Zero Trust with Zero Buzz
The objective of the talk is to: (10%) Clear out the noise around Zero Trust: why Zero Trust has became a buzzword (20%) Define Zero Trust (60%) Set the journey: how can we...
Trust No One, Always Verify
Event Recording
Trust No One, Always Verify
Cybercriminals no longer “hack” in – they simply log in. Once inside, they hunt for privileged accounts. A vast majority of breaches today are due to the abuse of stolen...
Identity Proofing as a Fundamental Element for Zero Trust
Event Recording
Identity Proofing as a Fundamental Element for Zero Trust
Zero Trust: Where do We Want to be in Five Years?
Event Recording
Zero Trust: Where do We Want to be in Five Years?
The digital-first customer experience and remote-first workforce pushed zero trust from buzzword to reality. And yet, much of the conversation is still heavy on theory and light on practice....
Credentialing-enabled Zero Trust Architecture for API Endpoint-Security
Event Recording
Credentialing-enabled Zero Trust Architecture for API Endpoint-Security
Traditional network security focuses on perimeter defenses, but many organisations, systems and processes no longer have a clearly defined network perimeter. To protect a modern digital...
Beyond Zero Trust to Achieve Zero Friction
Event Recording
Beyond Zero Trust to Achieve Zero Friction
Regulatory bodies, government agencies, and CIOs are mandating Zero Trust as a cyber security framework. What does Zero Trust mean for your security strategy? With a Zero Trust security model,...
Legal Trust Anchors for ZTA: The eIDAS 2 Proposal and the Role of EBSI
Event Recording
Legal Trust Anchors for ZTA: The eIDAS 2 Proposal and the Role of EBSI
Credential-based ZTA are a promising new approach for strengthening authentication policies, which is specially suitable for a transformed ecosystem where perimeters and boundaries have already...
Zero Trust in an Industry Where Trust is Key
Event Recording
Zero Trust in an Industry Where Trust is Key
How does a Financial Institution deploy a Zero Trust Model where employees and consumers need access to so much vital data in near real time.
1 2 3 4 5 6 7 Next