How to approach a Zero Trust security model

  Рет қаралды 29,478

Cisco

Cisco

Күн бұрын

Пікірлер: 5
@johnny3442
@johnny3442 3 жыл бұрын
I am very thankful to have been mentored in IT by knowledge security pros who redesigned network security before I ever started in IT. Having been an active but “low level” member of IT, I grew professionally in environments that were already zero trust; I never knew the “concept”, but I worked in the environment, taking it for granted and assuming that’s how all environments were without ever hearing the concept of zero trust. This video connected the dots between “what is” and “how it all works” while simultaneously demonstrating the capability of Cisco services. Very informative, I will be recommending this to other IT pros. Thank you!
@seyedali2663
@seyedali2663 4 жыл бұрын
It's perfect. Is there anywhere to access the presentation file?
@tripadadash4430
@tripadadash4430 4 жыл бұрын
Excellent - explained in very simple terms. Can the presentation be shared ?
@psiclops521
@psiclops521 3 жыл бұрын
Right around 22:45, the answer is to talk to the tech writer because he or she is the only one who understands the whole system.
@ishe728
@ishe728 3 жыл бұрын
I like zero trust but can't help to think about the hackers finding a way to beat it, with a devious smile.
New Zero Trust Innovations Power Cisco Secure Access
43:35
Zero Trust Architecture - Applying ZTA in Today’s Environment
52:23
SANS Cyber Defense
Рет қаралды 7 М.
The Singing Challenge #joker #Harriet Quinn
00:35
佐助与鸣人
Рет қаралды 5 МЛН
Who's spending her birthday with Harley Quinn on halloween?#Harley Quinn #joker
01:00
Harley Quinn with the Joker
Рет қаралды 10 МЛН
СОБАКА И  ТРИ ТАБАЛАПКИ Ч.2 #shorts
00:33
INNA SERG
Рет қаралды 1,9 МЛН
The Fallacy of the "Zero-Trust Network"
44:18
RSA Conference
Рет қаралды 55 М.
Zero Trust on AWS | AWS Events
49:10
AWS Events
Рет қаралды 10 М.
Overview of Zero Trust Architectures
45:42
MIT Lincoln Laboratory
Рет қаралды 32 М.
Resilience & protection through Zero Trust in Networking
33:14
Microsoft Security
Рет қаралды 5 М.
How Google Protects Its Corporate Security Perimeter without Firewalls
43:42
Cybersecurity and Zero Trust
17:59
IBM Technology
Рет қаралды 86 М.
Zero Trust Security
21:05
HashiCorp
Рет қаралды 32 М.
Exploring the Zero Trust Security Model | CONLL110
1:15:25
Microsoft Events
Рет қаралды 3,4 М.
The Singing Challenge #joker #Harriet Quinn
00:35
佐助与鸣人
Рет қаралды 5 МЛН