Why Implement Zero Trust

  Рет қаралды 31,106

IBM Technology

IBM Technology

Күн бұрын

See current threats: ibm.biz/BdP3Qh
Learn about IBM zero trust security solutions: ibm.biz/BdP3QV
Moving to a hybrid, multicloud infrastructure means your resources are also likely scattered throughout multiple IT environments with varying levels of visibility and control. It’s difficult to know if the right user has the right access to the right data. You need context to help you make the right decisions. Distinguished Engineer, Jeff Crume explains how "the bad guy" may already be in your house - as an analogy, comparing it to your business.
Download a free AI ebook: ibm.biz/Trust_...
Get started for free on IBM Cloud: ibm.biz/Zero_T...
Subscribe to see more videos like this in the future → ibm.biz/subscri...
#AI #Software #ITModernization #ZeroTrust #lightboard #IBM

Пікірлер: 47
@amjads8971
@amjads8971 2 жыл бұрын
IBM knows how to creating videos explaining complex topics in a very simple and precise manner
@davidkayembe5262
@davidkayembe5262 2 жыл бұрын
Just incredible
@timeglass777
@timeglass777 7 ай бұрын
It is a good analogy of ZTA but its concepts are much broader. ID verification, Access control, Monitoring and Analysis are just few of the key principles.
@johnwade1325
@johnwade1325 2 жыл бұрын
This is a nice presentation. Thank you. Another way I like to put it is this, "The role of security is to let the right people in, not to keep the wrong people out". Looked at it this way, zero trust doesn't look so draconian. This doesn't sit well with the house analogy, but does with real commercial computer systems (sadly, there have been cases throughout the history of IT where systems have been abused from the inside as well as from the outside). The point about granting people only the rights they need is well made - though you do need facilities and procedures to give temporary access when a critical worker on a system is suddenly unavailable: someone has to have the authority to grant temporary access - and then take it away as soon as the usual person returns. The point about "risk assessment" is also well made. You want everyone to come to your website and browse freely if you are selling something - but you want a solid guarantee of identity if they have a purchasing account with you: so different parts of your application may well have very different levels of security from total trust to zero trust, Granularity is key, and must be designed into the application from the outset. Good Code is Not Enough!
@jeffcrume
@jeffcrume Жыл бұрын
Well said, John!
@surenderarora1899
@surenderarora1899 Жыл бұрын
Great analogy of House to simplify the understanding - How to secure IT infra at Zero Trust Level. Nicely Explained - Never Trust Always Verify. Thanks a lot Jeff!
@jeffcrume
@jeffcrume Жыл бұрын
Thanks for taking the time to provide encouraging feedback! I’m glad you enjoyed it!
@louiseabigailpayuyo5120
@louiseabigailpayuyo5120 2 жыл бұрын
Excellent explanation! Very easy to understand. Thanks and hope you produce more of this type of content.
@erikslorenz
@erikslorenz 2 жыл бұрын
These vids rock. Whoever came up with the idea is the man
@mirochnik2008
@mirochnik2008 2 жыл бұрын
Impressive overview of complicated subject made simple by best of the best - @Jeff Crume!
@jeffcrume
@jeffcrume Жыл бұрын
Very nice of you to say so!
@macshort2645
@macshort2645 2 жыл бұрын
Jeff this was a great presentation !!!
@oladimejimichaeloloyede7203
@oladimejimichaeloloyede7203 2 жыл бұрын
I like the build-up scenario of the house security, is like holding a baby's hand from level 0 to a higher level of talking about the least privilege. Thank you.
@alexpishvanov736
@alexpishvanov736 2 жыл бұрын
Clear and genius explanation! As usual :)
@dadoll1660
@dadoll1660 2 жыл бұрын
Great analogy.
@steveandreassend8620
@steveandreassend8620 Жыл бұрын
This is excellent!
@alexxUKR
@alexxUKR 2 жыл бұрын
Very short, but nicely packaged overview of zero trust concept. Thank you,
@toenytv7946
@toenytv7946 2 жыл бұрын
Well explained. Good comparisons.
@jay2004r
@jay2004r 11 ай бұрын
This was a great explanation and great video!!
@jeffcrume
@jeffcrume 6 ай бұрын
Thanks for watching!
@robpickles3736
@robpickles3736 7 ай бұрын
Awesome presentation! Thank you for sharing the knowledge.
@jeffcrume
@jeffcrume 6 ай бұрын
Very kind of you to say!
@theyield2521
@theyield2521 Жыл бұрын
Brilliant stuff.
@micheldupont636
@micheldupont636 Жыл бұрын
I think it lacks the explanation of “why zero trust is essential when you are using the public cloud ?” Many companies are still thinking of perimetrical security because they are used of the “on premise” world. In the public cloud, the attacks can arrive from any place, any component…
@tzlwin
@tzlwin 11 ай бұрын
Very informative and useful, thank you.
@jeffcrume
@jeffcrume 6 ай бұрын
Glad you liked it!
@gabicolaco3101
@gabicolaco3101 2 жыл бұрын
It was very good, thanks for the explanation!
@user-ty2yl4wp9z
@user-ty2yl4wp9z 8 ай бұрын
Thank you for the great information
@jeffcrume
@jeffcrume 6 ай бұрын
Thank you for saying so!
@karengomez3143
@karengomez3143 Жыл бұрын
“The things that I trust the most are the things that I have verified the most” Depending on risks, we are setting our point in the implicit-zero tolerance spectrum… how much we’re willing to risk and our risk tolerance.
@davidkayembe5262
@davidkayembe5262 2 жыл бұрын
I give you ⭐⭐⭐⭐⭐
@davidearthos6453
@davidearthos6453 Жыл бұрын
only things i can verify.. do i trust .. start from zero and rebuild..
@brooklyndreadlocks8182
@brooklyndreadlocks8182 Жыл бұрын
What kind of board is that? I want one.
@IBMTechnology
@IBMTechnology Жыл бұрын
Search on "lightboard videos"
@jeffcrume
@jeffcrume Жыл бұрын
kzbin.info/www/bejne/gpXRe6KKaq6Khq8
@rajaganji7982
@rajaganji7982 2 жыл бұрын
What does DMZ mean?
@dadoll1660
@dadoll1660 2 жыл бұрын
demilitarized zone
@amjads8971
@amjads8971 2 жыл бұрын
Distinguish engineer,what is this role. This topic is related to security engineer isn’t it ?
@IBMTechnology
@IBMTechnology 2 жыл бұрын
Distinguish Engineer is an IBM title that recognizes technical achievement over a long period; it involves a formal nominations by peers and executives.
@rickharold7884
@rickharold7884 2 жыл бұрын
Fun
@TantalG
@TantalG 2 жыл бұрын
I don't trust this man.
@jeffcrume
@jeffcrume Жыл бұрын
Zero trust in action! 😂
@xelerated
@xelerated 2 ай бұрын
Well considering he is from IBM, not trusting him is a good thing
@RickLambert963
@RickLambert963 Жыл бұрын
How very 1984
@sergiomartinez5946
@sergiomartinez5946 3 ай бұрын
Lol saying pay per view in 2024.
@michaelsloushch3950
@michaelsloushch3950 2 жыл бұрын
said nothing
Understanding Hackers
10:41
IBM Technology
Рет қаралды 32 М.
Cybersecurity Architecture: Five Principles to Follow (and One to Avoid)
17:34
Touching Act of Kindness Brings Hope to the Homeless #shorts
00:18
Fabiosa Best Lifehacks
Рет қаралды 19 МЛН
Modus males sekolah
00:14
fitrop
Рет қаралды 26 МЛН
Securing Your IoT Devices
13:55
IBM Technology
Рет қаралды 31 М.
Cybersecurity and Zero Trust
17:59
IBM Technology
Рет қаралды 83 М.
RAG vs. Fine Tuning
8:57
IBM Technology
Рет қаралды 12 М.
Ultimate Guide to Zero Trust for Businesses
10:31
Eye on Tech
Рет қаралды 3,1 М.
Tech Talk: What is Public Key Infrastructure (PKI)?
9:22
IBM Technology
Рет қаралды 120 М.
Social Engineering - How Bad Guys Hack Users
14:58
IBM Technology
Рет қаралды 52 М.
Cybersecurity Architecture: Networks
27:31
IBM Technology
Рет қаралды 121 М.
What is Phishing
7:54
IBM Technology
Рет қаралды 40 М.
Touching Act of Kindness Brings Hope to the Homeless #shorts
00:18
Fabiosa Best Lifehacks
Рет қаралды 19 МЛН