Identity-Centric Security: The Zero Trust Perspective
In this session we explore the limitations of traditional security architectures, and explain how Zero Trust is best achieved with a new, open, and identity-centric model – the Software-Defined Perimeter (SDP) – which can significantly improve enterprise security, and finally let organizations bridge the gap between identity and network security. SDP verifies and secures all access to all resources, strictly limits network access, and literally makes network resources invisible to unauthorized users. We’ll explain how SDP avoids the limitations of traditional security architectures, delivers fine-grained network access control in a way that’s tied to each user’s context, and is dynamically responsive to changes in enterprise environments. We’ll conclude with an enterprise case study, showing how one organization obtained technical, business, and compliance benefits.