Zero trust & productivity: Striking a balance

How to Achieve Zero Touch in a Zero Trust Environment

Cover

Implementing a perimeter-based security architecture against modern threats will prove futile. Today, security must be traced back to the user and networks must always be assumed as hostile.

This is the basis of a zero-trust framework, and its premise is more pronounced during this time of ubiquitous remote work.

As networks evolve, devices become smarter and develop internet capabilities, and more apps and APIs emerge from the progression of DevOps.

There are more targets to attack, but from tight security, there are also more ways to slow your network down. How can you create a balanced environment? Watch this webcast to go in-depth about zero trust and how keep a network working with it.

Vendor:
BlackBerry
Premiered:
Aug 24, 2020
Format:
Multimedia
Type:
Webcast
Language:
English
Already a Bitpipe member? Login here

Download this Webcast!