5 New Technologies Transforming the Supply Chain
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network Segmentation
The Zero Trust security model requires network access requests to be authenticated and authorized via strict and dynamic polices and controls, whether a user or device is connecting from outside or inside the network security perimeter. While information security drives Zero Trust initiatives, network engineering and operations teams own much of the technology involved. Network teams are essential players.
Leading IT research firm Enterprise Management Associates (EMA) surveyed 252 North American and European IT and security professionals about how they use network segmentation, microsegmentation, and secure remote access solutions to build Zero Trust networks.
You will learn:
- Best practices for using Zero Trust network segmentation and remote network access solutions
- Zero trust collaboration strategies for network teams and security teams
- Emerging Zero Trust network technology requirements
- Impacts of the COVID-19 pandemic on Zero Trust initiatives