Technological Approaches to a Zero Trust Security Model
Presented by
John Tolbert, Lead Analyst, KuppingerCole, Richard Meeus, Director of Security, Technology and Strategy, EMEA, Akamai
About this talk
The traditional model of enforcing security at the network perimeter is no longer valid as employees, devices, and workloads move outside the corporate network.
A Zero Trust model offers an alternative that secures data while ensuring it is accessible from wherever employees are working. But finding the right technological approaches to Zero Trust is challenging.
Join this KuppingerCole webinar to:
- Understand how best to approach implementing Zero Trust
- Explore the technological considerations and options available
- Learn how to create a smarter way for users to access applications
- Discover effective ways to protect users from cyberthreats
- Learn how to deliver a phish-proof MFA strategy
- Get answers to your questions about Zero Trust
Leading companies worldwide choose Akamai to build, deliver, and secure their digital experiences — helping billions of people live, work, and play every day. Akamai Connected Cloud, a massively distributed edge and cloud platform, puts apps and experiences closer to users and keeps threats farther away. Learn more about Akamai’s cloud computing, security, and content delivery solutions.…