Oct 29, 2019

Cracking the Zero Trust Code

Chase Cunningham—Forrester, Jason Garbis—AppGate

Organizations are moving toward the Zero Trust model, embracing one of the greatest advancements in security in the last 10 years. Due to the amount of noise on the subject, it may be challenging to understand how real-life companies are implementing Zero Trust to solve security problems, the kind of organizations that have benefited the most from their deployments and how they are overcoming internal constraints.

Sep 10, 2019

How to Reduce Your Attack Surface

Jason Garbis—AppGate, Aaron Palermo—Optiv

Whether it’s adoption of the mobile workforce, heterogeneous and on-demand infrastructure or the proliferation of devices connecting to your corporate network, your attack surface is both a challenge and a risk.

Join AppGate and Optiv as we tackle the challenges associated with sprawling IT and lateral movement. Learn how Zero Trust security can help reduce your attack surface, as well as the risk of a breach.

Jun 06, 2019

Why it's Time to Kill Your VPN

Jason Garbis—AppGate, Matthew Staver—Verdant

VPNs are dangerous and overly complex. So why are we still pretending that VPNs are an effective security technology?

AppGate's Jason Garbis takes on the VPN with Verdant’s Cloud Services Practice Lead, Matthew Staver, who recently replaced VPNs to secure access across its hybrid environments.

Attend this webinar if you are responsible for implementing Zero Trust or managing complex VPN environments.

Feb 27, 2019

How to Remove Complexity as a Threat to Security

Leo Taddeo, Jason Garbis, and Ian Breeze

Security has struggled to keep pace with the rapid advances of IT, resulting in a reactive approach to protection. As security becomes more of a business imperative, security leaders are tasked to guide a secure digital vision for the company. This requires reimagining your protection strategy and streamlining technology and operations.

In this webinar, we’ll address the mounting complexity security professionals face today and put forth recommendations for removing unnecessary complexity that inhibits your ability to focus on what really matters, cyber-resilience.