Access Management , Digital Identity , Governance & Risk Management
Webinar: Zero Trust & the ID-Based Cybersecurity Perimeter
A confluence of events is bringing the need for a new cybersecurity perimeter into clearer focus. The rapid adoption of "cloud first" strategies -across multiple cloud computing flavors (SaaS, PaaS, IaaS and more) - combined with the reality that "work from home" simply hastened employees need for access to apps and other IT resources from anywhere, requires a rethinking of the traditional security perimeter. It's not that network-based protection/detection controls are dead: they are simply inadequate in enabling a Zero Trust security approach.
View this webinar as we discuss:
- The impact of cloud first
- How organizations are adopting identity-base perimeters as a fundamental Zero Trust building block
- The implications for Identity and Access Management tooling moving forward will be covered