In dynamic IT reality, traditional security mechanisms can no longer be trusted to successfully prevent unauthorized access or breaches, nor reduce the risk of an attacker’s lateral movement through your network. Therefore, it is time to deploy a different, holistic approach to granting access to your apps and environment.
Join the webinar to learn how to limit unauthorized network and data access by leveraging the Zero Trust Architecture principles - a continuous endpoint authentication and authorization for your IT environment using Cisco technologies.
How to achieve perimeterless security without harming productivity?
In today’s business, your workforce, workloads, and workplace are literally everywhere. And they – users, data, and devices – move across networks, clouds, and apps. This is great for user experience and productivity, but at the same time it greatly expands the cyber-attack surface. It makes it very difficult for organizations to control access to resources and defend themselves against cyber-attacks.
Zero Trust Architecture is a modern approach to protecting these modern, dynamics businesses and IT-environments, without harming productivity and user experience. Join the webinar to learn how to go from theory to practice and utilize the Zero Trust concepts when rolling out security policies within your environments.
In the webinar, we will talk about:
- What is Zero Trust Architecture?
Overview of Cisco’s Zero Trust Architecture, a leader in the Forrester Wave™: Zero Trust eXtended Ecosystem Platform Providers, Q4 2019
How to use Zero Trust to protect your Workforce
How to use Zero Trust to protect your Workload
How to use Zero Trust to protect your Workplace
- Date: Tuesday, February 11, 2019
- Time:14:00-15:00 (CET/GMT+1)
About the presenter
Stojan Rančić, IT security architect, NIL
Stojan Rančić, CCIE Security #17461, is a security expert who has been specializing in the area of networks and information systems since 2005. In addition, he has a strong background in open source systems, services, and solutions as well as virtualization technologies. He has extensive experience in designing and implementing cyber defense architectures in large corporate, governmental, and service provider environments.
Registration and recording
To attend, fill the form and register. The webinar will be recorded and we will send out the recording after the session.