Solarwinds Header
  • Product Presentation
  • Technik II
  • Governance, Riskmanagement & Compliance

Laying the Foundation for Zero Trust

This webcast will look at three easy steps to get started on your internal Zero Trust strategy and which SolarWinds products can support.

10/6/2020 2:45:00 PM – 10/6/2020 3:00:00 PM

Please log in or register in advance so that you can take part in actions or watch videos about the action!

This action is available to the it-sa 365 community as a video.

Solarwinds Header
  • Product Presentation
  • Technik II

This webcast will look at three easy steps to get started on your internal Zero Trust strategy and which SolarWinds products can support.

Language: German

Questions and Answers: Yes

graphical blue background
close

This video is available to the it-sa 365 community. Please register or log in with your login data.

Action description

Attacks are more frequent, more sophisticated, and more
successful, requiring organizations today to shift security strategies to more secure
models that take the most restrictive of stances when it comes to providing access. While the concept of zero-trust security has many IT organizations thinking in terms of identity and cloud services, zero trust must run on a solid foundation.

We should start by talking about the goals of zero-trust security. Zero trust involves creating an environment where each access request is first scrutinized to determine whether it should be allowed. This “never trust, always verify” method of access is a bit like passport control when entering a country—the default answer is no, but if you pass the system of checks, you’re allowed in.

Organizations using zero trust typically focus on identity and access management solutions for a federated and centralized means of identity that can provide users with access to a wide range of both on-premises and cloud-based resources. But simply focusing on this part of zero trust is much like solely thinking about building and staffing the passport control checkpoint without doing anything else.
What’s also needed is a way to establish and ensure underlying security controls are in place that define “who gets in.” There are three elements of zero trust that should be seen as foundational—they need to be in place and correctly implemented for zero trust to work. To keep with the passport control analogy, if you build and staff the checkpoint, but have no questions to ask the visitor nor standards of who can and can’t get it, it’s no security checkpoint at all.

So what three elements help establish the foundation of zero trust?

read more

Speaker