While the concept of “zero trust” is gaining attention, the Zero Trust model is not new to Red Hat. Join us for a conversation around the capabilities Red Hat provides, aligned with the pillars of both the Cybersecurity and Infrastructure Security Agency (CISA) and National Security Agency (NSA) frameworks including identity, device, network and environment, application workload, data, orchestration and automation, and visibility and analytics.
In this webinar, we’ll cover the capabilities available within Red Hat® Enterprise Linux®, Red Hat OpenShift®, and Red Hat Ansible® Automation Platform and how they can work together and with your organization’s other technology investments across a physical, virtual, and cloud estate. Red Hat products offer a winning strategy, a security-focused solution to define your zero trust roadmap, and automation to help achieve your goals.
In this webinar we’ll cover:
• An overview of how Red Hat technology aligns with the Zero Trust frameworks of CISA and NSA
• Macro and micro-segmentation
• How to move from implicit to explicit trust