Insights

Zero Trust

The Zero Trust paradigm focuses on eliminating implicit trust from IT architectures and enforcing strict identity verification and access controls for every user or device.

Zero Trust helps to redesign your cybersecurity architecture to function consistently and holistically across multiple IT environments and systems – and thus implementing Zero Trust properly will affect multiple existing and new security controls within your organization.

Guide
Guide
The Comprehensive Guide to Zero Trust Implementation
Read the full guide to learn how you can use Zero Trust to protect modern hybrid IT environments. Zero Trust applies to every aspect of an organization's processes.
Learn more
KC Open Select
KC Open Select
Zero Trust Network Access
Zero Trust Network Access (ZTNA) is becoming increasingly essential as organizations adapt to remote work, cloud adoption, and the growing sophistication of cyber threats.
Learn more
Blog
Blog
Access Management Trends Towards a Zero-Trust Paradigm
Organizations around the world have been rapidly modernizing their access management infrastructures in response to increased cyber-attacks and data breaches, enactment of security and privacy...
Learn more
Whitepaper
Whitepaper
RadiantOne: Identity Integration for Zero-Trust and Digital Transformation
Transition to a fully distributed and agile digital enterprise is increasingly seen as a matter of organizational survival. The COVID-19 pandemic overwhelmed any lingering doubt about its urgency....
Learn more
Event Recording
Event Recording
Workshop | Break the Kill Chain – An Intelligence-Led Model to Cyber Defence
Learn more
Cloud Codes of Conduct Get the EU Green Light, but More Is Still Needed
Blog
Cloud Codes of Conduct Get the EU Green Light, but More Is Still Needed
Green Light On May 20 th , 2021 it was announced that the EU Cloud Code of Conduct had received official approval by the Belgian Data Protection Authority, following the positive...
Finding Your Path to Zero Trust
Webinar Recording
Finding Your Path to Zero Trust
As users, devices and application workloads move outside the corporate network, the traditional model of enforcing security at the network perimeter is no longer effective. A Zero Trust model...
Martin Kuppinger: Modern IGA Capabilities & Zero Trust Identity
Event Recording
Martin Kuppinger: Modern IGA Capabilities & Zero Trust Identity
Panel: No Zero Trust Without Strong IAM - What You Need in IGA and Beyond for Enabling Zero Trust
Event Recording
Panel: No Zero Trust Without Strong IAM - What You Need in IGA and Beyond for Enabling Zero Trust
IGA in a World of Zero Trust
Blog
IGA in a World of Zero Trust
Zero Trust is a key paradigm for cybersecurity today, used well beyond the security circles. The goal is building cybersecurity that “ never (blindly) trusts ”, but “ always...
Analyst Chat #73: Cybersecurity Vulnerabilities of Remote Work
Analyst Chat
Analyst Chat #73: Cybersecurity Vulnerabilities of Remote Work
Shikha Porwal and Matthias Reinwarth have a coffee conversation over the security risks of working remotely. They talk through the vulnerabilities of a home network, and touch base with the...
RadiantOne: Identity Integration for Zero-Trust and Digital Transformation
Whitepaper
RadiantOne: Identity Integration for Zero-Trust and Digital Transformation
Transition to a fully distributed and agile digital enterprise is increasingly seen as a matter of organizational survival. The COVID-19 pandemic overwhelmed any lingering doubt about its urgency....
Maturing a Zero-Trust Strategy for the Extended Enterprise
Webinar Recording
Maturing a Zero-Trust Strategy for the Extended Enterprise
In the digital era, a 20th century perimeter-based approach to security is no longer appropriate or effective in securing the modern extended enterprise. Instead, a more flexible, identity-based...
Analyst Chat #64: Applying The Zero Trust Principle To The Software Supply Chain
Analyst Chat
Analyst Chat #64: Applying The Zero Trust Principle To The Software Supply Chain
Martin Kuppinger is one of the founders and the principal analyst of KuppingerCole and he is steering the overall development of the topics covered in KC's research, events and advisory. He joins...
Insights of a CISO: Interview with Thomas Malta
Event Recording
Insights of a CISO: Interview with Thomas Malta
Matthias Reinwarth: Zero Trust for Reducing the Risks of Security Incidents
Event Recording
Matthias Reinwarth: Zero Trust for Reducing the Risks of Security Incidents
Expert Chat: Interview with Stefan Würtemberger
Event Recording
Expert Chat: Interview with Stefan Würtemberger
Previous
10 11 12 13 14 15 16 Next