Accomplishing Zero Trust Security Using SDP

  Рет қаралды 34,686

The CISO Perspective

The CISO Perspective

Күн бұрын

Zero Trust security is the hottest topic of conversations among CISOs and security people. But for a long time, the question has been "How do I get there?"
The Software Defined Perimeter(SDP) is one of the most popular implementations of the Zero Trust security model. In this video, we review how to accomplish Zero Trust security using SDP

Пікірлер: 22
@tonyschlyter6262
@tonyschlyter6262 5 жыл бұрын
I don’t comment on videos often but you have really done a great job of making this a simple resource for the it pro who isn’t a total beginner. Thanks
@TheCISOPerspective
@TheCISOPerspective 5 жыл бұрын
Thanks for the kind words Tony! That was my goal, and glad you found it beneficial
@Happydrguy
@Happydrguy 5 жыл бұрын
Excellent video, informative!
@dermick
@dermick 5 жыл бұрын
Very good video - well done! One comment - "zero" trust, but you have to trust the SDP client software that's "verifying" the client. Current versions of these often make BYOD difficult or impossible. I feel that there is a lot more innovation possible on the client side.
@TheCISOPerspective
@TheCISOPerspective 5 жыл бұрын
Sorry for the late - completely agree on your comment around client side innovation. SDP clients leave a lot to be desired
@Calm_Energy
@Calm_Energy 4 жыл бұрын
The CISO Perspective are there any sdp clients you recommend?
@NajQazi
@NajQazi 3 жыл бұрын
​@@Calm_Energy It comes down to picking a solution from a particular vendor. For example, Cisco has AMP (Advanced Malware Protection). Zscaler has Zscaler Client Connector. Other Security vendors have similar capabilities. As I mentioned earlier, it all comes down to choosing the best security solution and vendor for your environment & business. Hope this helps & good luck!
@Metata40
@Metata40 2 ай бұрын
Well done and thanks for your time.
@awaismunawar301
@awaismunawar301 Жыл бұрын
This was brilliant. Cleared a few ambiguities in my concept. I can buy you a coffee mate.
@ravianantharamaiah7567
@ravianantharamaiah7567 4 жыл бұрын
Very informative. Thanks for the video
@scoogsy
@scoogsy 3 жыл бұрын
Excellent presentation.
@easyautomationengine2732
@easyautomationengine2732 2 жыл бұрын
very very informative Andy, keep it up man
@rasb421
@rasb421 3 жыл бұрын
Great explanation..
@bobdavislumbro4047
@bobdavislumbro4047 4 ай бұрын
GREAT VIDEO! helped me a lot, question when you say NAC or network access control stops at layer 2, what do you mean by that? same subnet?
@sameersaini3265
@sameersaini3265 2 жыл бұрын
Very well articulated. Small suggestion, if you can do it at a touch slow pace. Someone like me take a time to process the information. Thank you.
@larryogunbanjo4170
@larryogunbanjo4170 4 жыл бұрын
Wow wow wow
@tammyfretz7346
@tammyfretz7346 2 жыл бұрын
4:57 ah yes, the Gavin Belson signature box.... With banksy signature.
@studyit8141
@studyit8141 11 ай бұрын
Does it play NAC role as well n make NAC as redundant? I mean , can we replace NAC solution in the network with SDP ?
@NobogiSomebogi
@NobogiSomebogi Жыл бұрын
If cyber security has its own institution or club, then your next goal is to have your videos and channels being recommended by the clubs and institutions? You might want to talk to them, see if there is any topics they would like you to talk about for their members. Make a video or two for them.
@pandiannaidu7989
@pandiannaidu7989 11 ай бұрын
can you pls tell me which tool you used for this PPT?
@midsfb
@midsfb Жыл бұрын
Great video but I had to watch at .75 speed
@tedahd5004
@tedahd5004 2 жыл бұрын
eh man you made phd possible in six minutes
Securing Your AWS Virtual Private Cloud
7:48
The CISO Perspective
Рет қаралды 9 М.
Zero Trust Explained | Real World Example
21:46
CertBros
Рет қаралды 17 М.
Just try to use a cool gadget 😍
00:33
123 GO! SHORTS
Рет қаралды 85 МЛН
OMG😳 #tiktok #shorts #potapova_blog
00:58
Potapova_blog
Рет қаралды 3,7 МЛН
Breaking The Kill Chain: A Defensive Approach
13:18
The CISO Perspective
Рет қаралды 155 М.
What is XDR vs EDR vs MDR?  Breaking down Extended Detection and Response
8:54
The CISO Perspective
Рет қаралды 183 М.
The Zscaler Tech Sessions: Seven Elements of Zero Trust
20:22
Zscaler Inc.
Рет қаралды 10 М.
What is Security Service Edge (SSE)? SASE vs SSE vs VPN
6:36
The CISO Perspective
Рет қаралды 50 М.
The Fallacy of the "Zero-Trust Network"
44:18
RSA Conference
Рет қаралды 54 М.
Cybersecurity and Zero Trust
17:59
IBM Technology
Рет қаралды 78 М.
Zero Trust Network Access (ZTNA) vs Firewall
7:54
Steve Murphy
Рет қаралды 1,1 М.
ПОКУПКА ТЕЛЕФОНА С АВИТО?🤭
1:00
Корнеич
Рет қаралды 3,2 МЛН
Хотела заскамить на Айфон!😱📱(@gertieinar)
0:21
Взрывная История
Рет қаралды 4,1 МЛН
Игровой Комп с Авито за 4500р
1:00
ЖЕЛЕЗНЫЙ КОРОЛЬ
Рет қаралды 933 М.