Filter resources

Video

Zero Trust eXtended framework (and how to establish it with Cisco’s solutions)

In dynamic IT reality, traditional security mechanisms can no longer be trusted to successfully prevent unauthorized access or breaches, nor reduce the risk of an attacker’s lateral movement through your network. Therefore, it is time to deploy a different, holistic approach to granting access to your apps and environment. Join the webinar to learn how […]

2 minutes read

Stojan Rančić

IT security architect

Language

Enlgish

In dynamic IT reality, traditional security mechanisms can no longer be trusted to successfully prevent unauthorized access or breaches, nor reduce the risk of an attacker’s lateral movement through your network. Therefore, it is time to deploy a different, holistic approach to granting access to your apps and environment.

Join the webinar to learn how to limit unauthorized network and data access by leveraging the Zero Trust Architecture principles – a continuous endpoint authentication and authorization for your IT environment using Cisco technologies.

How to achieve perimeterless security without harming productivity?

In today’s business, your workforce, workloads, and workplace are literally everywhere. And they – users, data, and devices – move across networks, clouds, and apps. This is great for user experience and productivity, but at the same time it greatly expands the cyber-attack surface. It makes it very difficult for organizations to control access to resources and defend themselves against cyber-attacks.

Zero Trust Architecture is a modern approach to protecting these modern, dynamics businesses and IT-environments, without harming productivity and user experience. Join the webinar to learn how to go from theory to practice and utilize the Zero Trust concepts when rolling out security policies within your environments.

Webinar Details

In the webinar, we will talk about:

  • How to use Zero Trust to protect your Workplace
  • What is Zero Trust Architecture?
  • Overview of Cisco’s Zero Trust Architecture, a leader in the Forrester Wave™: Zero Trust eXtended Ecosystem Platform Providers, Q4 2019
  • How to use Zero Trust to protect your Workforce
  • How to use Zero Trust to protect your Workload
About the speaker

Stojan Rančić

IT security architect

Stojan Rančić, NIL, CCIE Security #17461, is a security expert who has been specializing in the area of networks and information systems since 2005. In addition, he has a strong background in open source systems, services, and solutions as well as virtualization technologies. He has extensive experience in designing and implementing cyber defense architectures in […]

Stojan Rančić

IT security architect

Language

Enlgish

Recent Video posts

Related

Resources