InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

From Risk to Resilience: Transitioning from VPNs to Zero Trust Architecture

Presented by

Deepen Desai Chief Security Officer, Zscaler Joby Menon VP, ZPA Product Management, Zscaler

About this talk

VPNs, whether on-premises or cloud-delivered, create unnecessary risk by exposing the attack surface and failing to prevent lateral threat movement if breached. Despite these vulnerabilities, organizations continue to use VPNs to connect remote users to applications. Recently, the Cybersecurity and Infrastructure Security Agency (CISA) released an emergency directive that mandated US federal agencies to immediately disconnect the VPN instances of a VPN vendor. In the face of the serious risks posed by VPNs, it is time for organizations across industries to transition from outdated VPNs to a zero trust architecture. Join Deepen Desai, Chief Security Officer at Zscaler, and Joby Menon, VP, ZPA Product Management at Zscaler, as they discuss this topic. In this on demand webinar, you will learn about: Recent VPN vulnerabilities and their impact on organizations, including insights from Zscaler Threatlabz Risks associated with using VPNs to access your organization’s resources How Zscaler’s zero trust private access solution enables secure application access for all users, from any location, without the attack surface and lateral threat movement vulnerabilities of VPNs
Zscaler

Zscaler

31772 subscribers249 talks
Zero Trust + AI: Protecting What Firewalls Can't
Traditional firewalls, VPNs, and public point solutions for data security are failing in the AI era, because they expand your attack surface and allow lateral threat movement. The Zero Trust Exchange delivers a new approach that eliminates the concept of implicit trust, operating on the principle: Never trust, always verify. It delivers zero trust architecture as a service from a resilient, cloud-native AI cybersecurity platform. Acting as an intelligent switchboard to enable Zero Trust Everywhere, it provides secure, any-to-any, zero trust communication that uses business policies, not networks, for all of your workforces, branches, and clouds. The platform, built upon the Zero Trust Architecture and AI foundation, provides five integrated solutions: Cyberthreat Protection, Data Security, Zero Trust Branch and Cloud, and Security Operations.
Related topics