This resource is no longer available

Cover Image
“Trust is always a vulnerability in a digital system,” - John Kindervag, Founder of Zero Trust and Field CTO at Palo Alto Networks Much has been written about the topic of Zero Trust. Is it a security buzz word or a true effective security strategy? High-profile breaches involving “trusted” insiders have given industry-wide visibility to the fact that trust represents a vulnerability for digital systems. It’s something malicious actors can and do exploit for their advantage. Zero Trust was first introduced around the principles of “never trust, always verify” as a means for enterprises to implement effective network segmentation. As the model has been embraced, Zero Trust evolved to become a strategic Cybersecurity initiative that major enterprises align to in order to prevent successful cyberattacks. Watch as our Palo Alto Networks® expert John Kindervag discusses the “whys and hows” of building a Zero Trust architecture. In this webcast, you will: • Learn specific outcomes of implementing a Zero Trust architecture • Hear recommendations on where to start when planning and implementing a Zero Trust framework • See how Palo Alto Networks performed in an independent evaluation on Zero Trust Networks • Get your questions answered in our Live Q&A
Vendor:
Posted:
Feb 26, 2019
Premiered:
Feb 26, 2019, 05:00 EST (10:00 GMT)
Format:
Type:
Webinar

This resource is no longer available.