Send message to

Do you want to send the message without a subject?
Please note that your message can be maximum 1000 characters long
Special characters '<', '>' are not allowed in subject and message
reCaptcha is invalid.
reCaptcha failed because of a problem with the server.

Your message has been sent

You can find the message in your personal profile at "My messages".

An error occured

Please try again.

Make an appointment with

So that you can make an appointment, the calendar will open in a new tab on the personal profile of your contact person.

Create an onsite appointment with

So that you can make an onsite appointment, the appointment request will open in a new tab.

it-sa 365: Header Desktop solarwinds
Launch Days Technology I

Laying the Foundation for Zero Trust

This webcast will look at three easy steps to get started on your internal Zero Trust strategy and which SolarWinds products can support.

calendar_today Tue, 06.10.2020, 14:45 - 15:00

event_available Digital

Action Video

south_east

Action description

south_east

Speaker

south_east

Product

south_east

Themes

Governance, Riskmanagement and Compliance

Organizer

Event

This action is part of the event Launch Days

Action Video

grafischer Background
close

This video is available to the it-sa 365 community. 
Please register or log in with your login data.

Action description

Attacks are more frequent, more sophisticated, and more successful, requiring organizations today to shift security strategies to more secure models that take the most restrictive of stances when it comes to providing access. While the concept of zero-trust security has many IT organizations thinking in terms of identity and cloud services, zero trust must run on a solid foundation. We should start by talking about the goals of zero-trust security. Zero trust involves creating an environment where each access request is first scrutinized to determine whether it should be allowed. This “never trust, always verify” method of access is a bit like passport control when entering a country—the default answer is no, but if you pass the system of checks, you’re allowed in. Organizations using zero trust typically focus on identity and access management solutions for a federated and centralized means of identity that can provide users with access to a wide range of both on-premises and cloud-based resources. But simply focusing on this part of zero trust is much like solely thinking about building and staffing the passport control checkpoint without doing anything else. What’s also needed is a way to establish and ensure underlying security controls are in place that define “who gets in.” There are three elements of zero trust that should be seen as foundational—they need to be in place and correctly implemented for zero trust to work. To keep with the passport control analogy, if you build and staff the checkpoint, but have no questions to ask the visitor nor standards of who can and can’t get it, it’s no security checkpoint at all. So what three elements help establish the foundation of zero trust? ... read more

Language: German

Questions and Answers: Yes

Speaker

show more
close

This content or feature is available to the it-sa 365 community. 
Please register or log in with your login data.