Insights

Zero Trust

The Zero Trust paradigm focuses on eliminating implicit trust from IT architectures and enforcing strict identity verification and access controls for every user or device.

Zero Trust helps to redesign your cybersecurity architecture to function consistently and holistically across multiple IT environments and systems – and thus implementing Zero Trust properly will affect multiple existing and new security controls within your organization.

Guide
Guide
The Comprehensive Guide to Zero Trust Implementation
Read the full guide to learn how you can use Zero Trust to protect modern hybrid IT environments. Zero Trust applies to every aspect of an organization's processes.
Learn more
Webinar
Webinar
Mastering Global IAM for Cybersecurity Excellence: From Zero Trust Principles to Identity Threat Detection & Response (ITDR)
In today's interconnected global landscape, the role of Identity and Access Management (IAM) has never been more crucial in shaping cybersecurity strategies. As businesses expand across borders,...
Learn more
Blog
Blog
The Non-Zero Elements of Zero Trust
The ongoing SolarWinds incident illustrates that the much-lauded Zero Trust security paradigm is, in fact, based on trust. Zero Trust is about authenticating and authorizing every action within a...
Learn more
Whitepaper
Whitepaper
Zero Trust Network Access for OT environments
Operational Technology (OT) environments are often quite different from regular enterprise IT environments in terms of hardware and software deployed. However, both OT and IT need rigorous security...
Learn more
Webinar Recording
Webinar Recording
Maturing a Zero-Trust Strategy for the Extended Enterprise
In the digital era, a 20th century perimeter-based approach to security is no longer appropriate or effective in securing the modern extended enterprise. Instead, a more flexible, identity-based...
Learn more
CAEP and Shared Signals - Past, Present and Future
Event Recording
CAEP and Shared Signals - Past, Present and Future
What started as a simple blog post from Google has rapidly ballooned into an industry movement. Major vendors have implemented the Continuous Access Evaluation Protocol / Profile (CAEP) and...
Shut The Front Door - A Risk-based Case for Zero Trust Authentication
Event Recording
Shut The Front Door - A Risk-based Case for Zero Trust Authentication
Authentication is broken, and longer, stronger passwords combined with first-generation MFA will not save the day. Hopefully, this is no longer controversial. We have over a decade's worth of data...
City of The Hague: Adding Access Control to Microservice Architectures for ZTA
Event Recording
City of The Hague: Adding Access Control to Microservice Architectures for ZTA
The Common Ground movement of the Dutch municipalities is developing innovative solutions for greater interoperability. An important part of this is the data landscape, where functionality is...
Orchestrating Zero Trust -
Event Recording
Orchestrating Zero Trust - "Detect, Decide, Direct"
The Zero Trust paradigm, the approach of eliminating inherent trust in an IT architecture and always verifying, has been discussed for over a decade. It is well known that Zero Trust is a team...
FIDO 2: Zero Trust in Action with Passwordless Phishing Resistant Authentication
Event Recording
FIDO 2: Zero Trust in Action with Passwordless Phishing Resistant Authentication
By now, organizations are well aware of the need for better protecting data and application with modern access management and authentication. Thales and Microsoft partner to help organizations...
Architecting Identity-First Zero Trust Implementations
Event Recording
Architecting Identity-First Zero Trust Implementations
Zero Trust starts with Identity. It ends with authorization. And it is centered around policy-based controls for authentication, access, and more. IAM is ubiquitous in Zero Trust. Thus, every Zero...
Authorization Trends in the Era of Zero Trust & Web 3
Event Recording
Authorization Trends in the Era of Zero Trust & Web 3
In this Session we will look at the business and security benefits of moving to policy-based access controls (PBAC), how this supports a Zero Trust approach to security, and how PBAC can be...
Pioneering Zero Trust Network Access With Intelligent Microsegmentation
Webinar Recording
Pioneering Zero Trust Network Access With Intelligent Microsegmentation
Adopting a Zero Trust security model of strict identity verification and access control for every user or device is widely accepted as a solution, but many organizations struggle to find the best...
Re-Imagining Identity Management for the Digital Era
Webinar Recording
Re-Imagining Identity Management for the Digital Era
Join identity and security experts from KuppingerCole Analysts and ARCON for a lively discussion about what exactly are the biggest identity challenges facing modern businesses, how those...
Analyst Chat #163: Zero Trust in Artificial Intelligence
Analyst Chat
Analyst Chat #163: Zero Trust in Artificial Intelligence
In this podcast episode, Alexei Balaganski and Matthias discuss the increasing use of ChatGPT and other machine learning-based technologies in research and the potential risks associated with...
Understanding the Privacy Evolution to Get Ahead of the Curve
Webinar Recording
Understanding the Privacy Evolution to Get Ahead of the Curve
Join privacy experts from KuppingerCole Analysts and OneTrust as they discuss the evolving privacy landscape and how businesses can navigate it successfully, as well as share guidance on how to...
Championing Privileged Access Management With Zero Trust Security
Webinar Recording
Championing Privileged Access Management With Zero Trust Security
A modern approach to securing privileged accounts is to apply the principle of Zero Trust: Never trust, always verify. While Zero Trust is not an off-the-shelf solution, it is modern vendors of...
Previous
1 2 3 4 5 6 7 Next