How to make your IT security go beyond your network – and make people your perimeter

Okta to highlight zero-trust security later this month

Got Tips?

Webcast So-called zero-trust security architecture is essentially a real-life version of what everybody fails to get right in spy thrillers. While agents carefully check their perimeter, they forget the enemy could be right alongside them the whole time, working within their team for years.

In the real world, just as in your favorite movie or novel, an untrusted actor in a trusted network can often spell havoc for an organisation, costing money and and damage reputation for years, or end a business altogether.

This is where zero-trust security seeks to change the rules, and does this by reassessing exactly what’s meant by trusted and untrusted parts of the network. Rather than looking at the physical reality of the network itself, either on a fixed geographical and hardware level, or even on a wider cloud or mobile network, zero trust goes transcends traditional perimeters.

By using the people themselves as the perimeter, trust becomes a whole different concept, with identity verification and authentication being the critical component in determining whether an environment is secure or not. This means ensuring identity and access management is a focal point of an organisation’s security approach.

This is the topic of The Register’s next webcast on 29 July, 2020, at 11.30 SGT. The Reg’s APAC editor Simon Sharwood will be joined by Karunanand Menon of IAM specialists Okta. Menon will also bring a customer along to rationalize use cases in the field.

The panel will cover shifts in the security landscape that have helped lay the foundations for zero-trust architecture, how a zero-Trust extended ecosystem could look when applied today, and how to build such a program to protect your organisation now, and for the future.

Sign up for the webcast, brought to you by Okta, right here.


Biting the hand that feeds IT © 1998–2020