Insights

Zero Trust

The Zero Trust paradigm focuses on eliminating implicit trust from IT architectures and enforcing strict identity verification and access controls for every user or device.

Zero Trust helps to redesign your cybersecurity architecture to function consistently and holistically across multiple IT environments and systems – and thus implementing Zero Trust properly will affect multiple existing and new security controls within your organization.

Guide
Guide
The Comprehensive Guide to Zero Trust Implementation
Read the full guide to learn how you can use Zero Trust to protect modern hybrid IT environments. Zero Trust applies to every aspect of an organization's processes.
Learn more
Webinar
Webinar
Speeding Up Zero Trust Delivery Using Managed Services
The attack surface of business IT is expanding rapidly, demanding a modern approach to cybersecurity. Many organizations seek to achieve this by adopting a Zero Trust security model or signing up...
Learn more
Blog
Blog
A Look at NIST’s Zero Trust Architecture
NIST, the US National Institute for Standards and Technology, recently released SP 800-207 Zero Trust Architecture . The NIST special publication examines the principles of and motivations for...
Learn more
Leadership Compass
Leadership Compass
Zero Trust Network Access
This report is an overview of the market for Zero Trust Network Access (ZTNA) solutions and provides you with a compass to help you to find the solution that best meets your needs. We examine the...
Learn more
Webinar Recording
Webinar Recording
Re-Imagining Identity Management for the Digital Era
Join identity and security experts from KuppingerCole Analysts and ARCON for a lively discussion about what exactly are the biggest identity challenges facing modern businesses, how those...
Learn more
Panel | Looking into the International and German Governmental Cybersecurity Architecture
Event Recording
Panel | Looking into the International and German Governmental Cybersecurity Architecture
From Christina Rupp’s initial talk, we have seen that Germany’s governmental cybersecurity architecture is a complex ecosystem. In this Panel Session, we will discuss challenges and...
R.O.N. - Return on Negligence – The Impact of Cybercrime
Event Recording
R.O.N. - Return on Negligence – The Impact of Cybercrime
The cost of doing nothing is something that today we have to factor into many aspects of our lives.  Inaction hurts and we’ll briefly talk about the 6 degrees of separation for the...
Quantum Computers: The Ultimate Opponent for Data Protection
Event Recording
Quantum Computers: The Ultimate Opponent for Data Protection
Workshop | Strategy, Risk, and Security: Building Business Resilience for Your Organization
Event Recording
Workshop | Strategy, Risk, and Security: Building Business Resilience for Your Organization
Every business should be equipped to understand for itself what most threatens and endangers its business model. This is the starting point for preparation measures for disruptions and crises...
Microshard Technology: An Enabler for GDPR/Schrems II Compliance
Event Recording
Microshard Technology: An Enabler for GDPR/Schrems II Compliance
This session will examine the ruling of 16 July 2020, where the Court of Justice of the European Union (the Court) in its Case C-311/18 Data Protection Commissioner v Facebook Ireland and...
Exploring the Impact of Cybersecurity Regulations in the Digital World
Event Recording
Exploring the Impact of Cybersecurity Regulations in the Digital World
The European Commission is working on various legal initiatives for the European Union related to the digitial world, and they are in various states of being adopted. This presentation gives an...
Zero Trust Journey, How We Moved from an Immature Organization to Zero Trust
Event Recording
Zero Trust Journey, How We Moved from an Immature Organization to Zero Trust
This is the story of our journey to Zero Trust, from the initial analysis to its technical and effective implementation. As many organizations our starting point was not the best one (lack of...
Security Automation: Realizing Business Benefits, Without Adding Headcount
Event Recording
Security Automation: Realizing Business Benefits, Without Adding Headcount
The next generation of cyber threats have arrived and there aren’t enough security people or budgets to handle the growing volume and complexity. This presentation will explore...
Zero Trust Is Table Stakes, Zero Knowledge Is the Next Evolution
Event Recording
Zero Trust Is Table Stakes, Zero Knowledge Is the Next Evolution
Zero trust has been around in one shape or form in security for many years, usually under different names like the "Principle of least privilege" or "Mandatory Access Control'. It exists for a...
Government's Role in Providing a Secure Framework for Digital Transformation
Event Recording
Government's Role in Providing a Secure Framework for Digital Transformation
This keynote will explore the role of government in providing a secure framework for digital transformation.
Previous
2 3 4 5 6 7 8 Next