Session
Still behind the firewalls? Time to Zero Trust!
Zero Trust is a security model centered on the belief that organizations should not automatically trust anything inside or outside its perimeters and instead must verify anything and everything trying to connect to its systems before granting access. Implementing a true Zero Trust Model requires that all components of the model - identities, devices, apps, networks and applications — be validated and proven trustworthy. In an ideal Zero Trust environment, this contains scenarios like:
- Strong identities
- managed and trusted devices
- Least-privilege user rights
- Service health is verified
In this session we will identify some of this core scenarios for a real Zero Trust Maturity model using Microsoft cloud solutions.
Zero Trust: "Never trust, always verify".
Zero Trust access architecture addresses the modern security challenges that come with cloud migration and a mobile workforce. By implementing Zero Trust, Microsoft takes a layered approach to secure corporate and customer data.
Alain Schneiter
scopewyse GmbH | Partner | Solutions Architect | Microsoft MVP Security
Bern, Switzerland
Links
Please note that Sessionize is not responsible for the accuracy or validity of the data provided by speakers. If you suspect this profile to be fake or spam, please let us know.
Jump to top