Presented by
Webinar | March 23, 2023 | 12:00PM Central
The classic network approach is to set up the perimeter defense by installing firewalls along with IDS/IPS services. Couple access paths i.e citrix or vpn to allow small number of remove workforce and operational support. Within this perimeter is considered trusted.
Today's landscape we have remote, hybrid & a dynamic workforce, BYOD, Software as a Service SaaS, Salesforce, ServiceNow, GitHub etc.
We also have Identity As The New Parameter Approach where traditional network perimeter fades away. We have authentication identity, human and machine and identity requesting access.
You may have made significant investment with the "new" identity perimeter. Is this "new" perimeter sufficient to stopping attacks? Attacks vectors that breach the first identity perimeter include stolen credentials, credential stuffing, MFA bombing, etc. What do you do when bad actors bypass the "new identity" perimeter & network perimeter?
Zero Reference Architecture Dual Identity Perimeters that is what!
Will be talking about this in depth & of course answering any questions.
© 2004-2024 GLW Specialty | privacy policy