Zero Trust Security in Remote Support and RMM
Strengthen your IT security: Tips on Zero Trust authentication and protection against unauthorized access in just 15 minutes.
Topic
Awareness / Phishing / FraudCloud SecurityEndpoint ProtectionGovernance, Riskmanagement and ComplianceManaged Security Services / HostingMobile SecurityNetwork Security / Patch ManagementSecure Homeoffice
When & Where
Details
Format:
Management lecture
Session description
Today, nearly all organisations of all sizes employ a form of Remote Support, Remote Access or Monitoring solution to deliver better IT and technical support services. In this short 15 minute session, Csaba Jaromi, Senior Director Solutions Consulting at GoTo, shares recommendations and best practices on how to harden endpoint authentication using Zero Trust capable solutions, and how to consider several layers of authentication to ensure no unauthorised access or supply chain vulnerabilities can impact your business.