This resource is no longer available

Cover Image
The network perimeter no longer exists. And this isn’t just theory. This is evident in the massive amount of data breaches we’ve seen in the last five years, the vast majority of which happened as a result of trust being abused inside of the perimeter. The problem is further compounded by the fact that applications which were designed to live inside of a network perimeter often have the worst security profiles. Join Andy Crail, EMEA Manager Solutions Engineering with Akamai Technologies, as he discusses how to move beyond perimeter security, and focus on: - How trust is not an attribute of location - Why a pessimistic view on security where every machine and user should be untrusted until proven otherwise is the future - How Google BeyondCorp and Software Defined Parameters can help mitigate attacks focused on north/south traffic - How microsegmentation can help mitigate attacks focused on east/west traffic - Best practices to adopt a zero trust, continuously adaptive risk and trust security model
Vendor:
Posted:
Apr 10, 2019
Premiered:
Apr 10, 2019, 08:00 EDT (12:00 GMT)
Format:
Type:
Webinar

This resource is no longer available.