SASE; Future of Zero Trust
Facebook Twitter LinkedIn

SASE; Future of Zero Trust

Combined Session
Thursday, May 11, 2023 17:30—18:30
Location: B 09

Market Overview: Secure Access Service Edge (SASE)

The term secure access service edge (SASE) has become popular in recent months and has been adopted by numerous vendors. SASE stands for a concept that integrates a range of cloud-native security services including cloud access security brokers (CASB), firewall as a service (FWaaS), secure web gateways (SWG), and zero-trust network access (ZTNA), with wide-area network (WAN) capabilities for delivering both directly to any edge computing location. In this session, KuppingerCole´s John Tolbert will give an overview of the market for SASE solutions and provide a compass to help buyers find the product that best meets their needs. KuppingerCole examines the market segment, vendor capabilities, relative market share, and innovative approaches to providing SASE solutions.

Market Overview: Secure Access Service Edge (SASE)
Event Recording
Market Overview: Secure Access Service Edge (SASE)
Click here to watch the recording of this session. Please note that this video is only available to event participants and subscribers. You'll need to log in to watch it.
Market Overview: Secure Access Service Edge (SASE)
Presentation deck
Market Overview: Secure Access Service Edge (SASE)
Click here to download the slide deck. Please note that downloads are only available for event participants and subscribers. You'll need to log in to download it.
John Tolbert
John Tolbert
KuppingerCole
  John Tolbert is a Lead Analyst and Managing Director of KuppingerCole, Inc (US). As Lead Analyst, John covers a number of different research areas, outlined below. John also advises...

Zero Trust: Where do We Want to be in Five Years?

The digital-first customer experience and remote-first workforce pushed zero trust from buzzword to reality. And yet, much of the conversation is still heavy on theory and light on practice. Cyentia completed a global study of high-level practices which measurably contribute to a more successful cybersecurity program based on a rigorous survey of nearly 5,000 practitioners. Within that study, we analyzed commonalities of organizations implementing and operating Zero Trust. Let's look closely at where we are today.

Now imagine it is 2028. You’re five years into your Zero Trust transformation. People like it and usability has improved. Defensibility is better, too, with a number of attacks having been stopped over the past couple years. But then, in 2028, you get the call. There’s been a security breach. What happened!? This session will explore the future with a pre-mortem on how breaches will look under a Zero Trust architecture.

Rajan Barara
Rajan Barara
Entrust
Rajan Barara is Director of Product Management for Identity at Entrust. In this webinar, he will speak about passwordless experience and what organizations should look for in a passwordless...
Wolfgang Goerlich
Wolfgang Goerlich
Cisco
J. Wolfgang Goerlich is an Advisory CISO for Cisco Secure. Prior to this role, he led IT and IT security in the healthcare and financial services verticals. Wolfgang has held VP positions at...
Gerald Horst
Gerald Horst
PwC
Gerald Horst joined PwC in 2016 as Partner and is leading PwC Europe’s Digital Identity team. Before joining PwC, Gerald held an executive position for over 15 years at Everett, a consulting...
Carla Roncato
Carla Roncato
Watchguard
Carla Roncato is WatchGuard’s Vice President of Identity. She is an industry expert in identity management, access management, open identity standards, data security, privacy, and zero-trust...

Revolutionizing Identity Governance and Administration with Low-Code Bot Automation

Identity Governance and Administration (IGA) is critical for ensuring the security of an organization, but it can also be a complex and time-consuming process. Join us for an engaging conversation on how Identity Governance and Administration Bot Flow (IGABotFlow) is revolutionizing the IGA field. This new approach combines the power of low-code orchestration, bot technologies, and a visual interface to simplify the management of access to sensitive information and resources while improving security.

"Citizen developers" will learn how to use IGABotFlow to automate complex business processes, including identity-related tasks, with low code visual tools. Additionally, attendees will discover how bots can proactively monitor and respond to events and changes in data, performing tasks and interacting with users without explicit requests. IGABotFlow is a game-changer in the field of identity governance and access management. Attendees will learn about the use cases where this technology could make a difference in their organization.

Revolutionizing Identity Governance and Administration with Low-Code Bot Automation
Event Recording
Revolutionizing Identity Governance and Administration with Low-Code Bot Automation
Click here to watch the recording of this session. Please note that this video is only available to event participants and subscribers. You'll need to log in to watch it.
Revolutionizing Identity Governance and Administration with Low-Code Bot Automation
Presentation deck
Revolutionizing Identity Governance and Administration with Low-Code Bot Automation
Click here to download the slide deck. Please note that downloads are only available for event participants and subscribers. You'll need to log in to download it.
Dr. Michael Amanfi
Dr. Michael Amanfi
EmpowerID
Dr. Amanfi is a highly accomplished and respected expert in the field of cloud computing. He holds a Doctorate in Management and an MS in Information Technology Management from Grand Canyon...

Tickets

On-Demand Access
Re-live EIC 2023
€500
 
Watch 200 sessions on-demand
Download all available presentations
Subscribe for updates
Please provide your email address