This resource is no longer available

Cover Image
“Trust is always a vulnerability in a digital system,” - John Kindervag, Founder of Zero Trust and Field CTO at Palo Alto Networks Much has been written about the topic of Zero Trust. Is it a security buzz word or a true effective security strategy? High-profile breaches involving “trusted” insiders have given industry-wide visibility to the fact that trust represents a vulnerability for digital systems. It’s something malicious actors can and do exploit for their advantage. Zero Trust was first introduced around the principles of “never trust, always verify” as a means for enterprises to implement effective network segmentation. As the model has been embraced, Zero Trust evolved to become a strategic Cybersecurity initiative that major enterprises align to in order to prevent successful cyberattacks. Watch as our Palo Alto Networks® expert John Kindervag discusses the “whys and hows” of building a Zero Trust architecture. In this webcast, you will: • Learn specific outcomes of implementing a Zero Trust architecture • Hear recommendations on where to start when planning and implementing a Zero Trust framework • See how Palo Alto Networks performed in an independent evaluation on Zero Trust Networks
Vendor:
Posted:
Jan 17, 2019
Premiered:
Jan 17, 2019, 13:00 EST (18:00 GMT)
Format:
Type:
Webinar

This resource is no longer available.