The Zero Trust security model requires network access requests to be authenticated and authorized via strict and dynamic polices and controls, whether a user or device is connecting from outside or inside the network security perimeter. While information security drives Zero Trust initiatives, network engineering and operations teams own much of the technology involved. Network teams are essential players.
Renowned IT research firm, Enterprise Management Associates (EMA) surveyed 252 North American and European IT and security professionals about how they use network segmentation, micro-segmentation, and secure remote access solutions to build Zero Trust networks. This webinar will highlight the essential findings of this new research and explore how networking technologies are essential to a Zero Trust initiative.