Zero trust security for networks

Logo
Presented by

Jamie Beck and Craig Brandt

About this talk

At Red Hat, our mission is to design, adopt, and promote the use of zero trust architectural patterns. This approach takes the place of implicit trust with the principle, "never trust, always verify." The last several years have seen a rapid increase in the number of devices across organizations’ networks that are decentralized and need improved security and management. This creates internal and external risks because much of what used to be housed in offices is now in employees’ homes and running on their personal networks. At the same time, domestic and international cyberattacks are increasingly common. With many disparate tools, devices, and processes, a zero trust framework is needed to help department leads and cybersecurity professionals manage different networking environments, coordinate, investigate and respond, and work toward unifying these tools, devices, and processes. Red Hat® Ansible® Automation Platform can help to stitch these tools and processes together through automation.
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (203)
Subscribers (45848)
Discover how Red Hat’s open hybrid cloud delivers IT services on any infrastructure quickly and cost effectively with a broad portfolio of hybrid cloud infrastructure, application services, cloud-native application development, and automation solutions.