Windows 10 Windows Client Windows Virtual Desktop Windows Defender ATP Microsoft 365 Microsoft Office365 Microsoft EM+S Microsoft Intune Windows Autopilot Microsoft
Implementing a true Zero Trust model requires that all components — user identity, device, network, and applications — be validated and proven trustworthy. Zero Trust verifies identity and device health prior to granting access to corporate resources.
In an ideal Zero Trust environment, the following four elements are necessary:
- Strong identity
- managed and trusted devices
- Least-privilege user rights
- Service health is verified
In this session we will identify some core scenarios for a real zero trust model.
Zero Trust access architecture addresses the modern security challenges that come with cloud migration and a mobile workforce. By implementing Zero Trust, Microsoft takes a layered approach to secure corporate and customer data.
Alain (Al) Schneiter is one of the ‘make it noble’ partners, supporting clients and partners in training, concepts, designs and implementations around Microsoft 365. He supports communities with his Microsoft 365 know-how. Alain helps customers using the right architecture for deploying Windows and Apps and transform their current device management to the Azure Cloud. Alain is focused on Microsoft Technologies, especially on Microsoft Azure AD, Microsoft 365, Microsoft Enterprise & Security Suite (EM&S), Windows 10 and System Center.