Established in 2010 by industry analyst John Kindervag, the “zero-trust model” is centered on the belief that an organization should not automatically trust anything inside or outside its perimeters and instead must verify anything and everything trying to connect to its systems before granting access.
In this webinar we provide a demo and address:
- The evolution of perimeter security
- Introducing the concept of zero-trust and the deep rooted connection privileged access security has with zero-trust frameworks
- Foundational security controls that align to zero-trust models and architectures