Send message to

Do you want to send the message without a subject?
Please note that your message can be maximum 1000 characters long
Special characters '<', '>' are not allowed in subject and message
reCaptcha is invalid.
reCaptcha failed because of a problem with the server.

Your message has been sent

You can find the message in your personal profile at "My messages".

An error occured

Please try again.

Make an appointment with

So that you can make an appointment, the calendar will open in a new tab on the personal profile of your contact person.

Create an onsite appointment with

So that you can make an onsite appointment, the appointment request will open in a new tab.

Forums it-sa Expo Knowledge Forum E

The right security architecture for cloud and on-premise services

Join us in looking at the requirements of yesterday and the challenges of tomorrow!

calendar_today Tue, 25.10.2022, 14:45 - 15:00

event_available On site

Action Video

south_east

Action description

south_east

Speaker

south_east

Themes

Cloud Security Identity and access management

Event

This action is part of the event Forums it-sa Expo

Action Video

grafischer Background
close

This video is available to the it-sa 365 community. 
Please register or log in with your login data.

Action description


The right security architecture is the foundation for effective protection of services and information. In this context, the rapidly advancing use of the cloud and the desire for hybrid work models (work-from-anywhere, WFA) brings new tasks and risks for cybersecurity. In this new world, system and network boundaries become less important and perimeter-based mechanisms no longer provide effective protection.

Modern approaches such as Zero Trust Network Access (ZTNA) and Secure Access Service Edge (SASE) offer new ways to secure these scenarios. The use of digital identity plays a central role here. It is a key criterion for granting access, but it also represents an attack vector itself.
To protect these identities, but also to integrate them, a powerful Identity and Access Management (IAM) is needed, providing key elements for any contemporary cybersecurity solution with core features such as "adaptive authentication", "risk-based access control" and "context-aware policy management".

This presentation will highlight the basic conceptual frameworks. It will look at both the interaction as a reference architecture but also the applications to existing and changing IT structures. We look at the requirements of yesterday and the challenges of tomorrow: Multi- & Hybridcloud, On Premise, Legacy- and Edge-Computing.
... read more

Downloads

Language: German

Questions and Answers: No

Speaker

show more
close

This content or feature is available to the it-sa 365 community. 
Please register or log in with your login data.