Zero Trust Network Access – Why, What, Where and How

As government agencies continue to progress workforce mobility and cloud computing as part of their IT transformation mission, workloads are moving beyond the cover of protected network conclaves and traditional perimeter defenses. This adds new considerations to ensure comply-to-connect governance, data protection directives, as well as digital workplace productivity. Hence the move to augment traditional secure access with Zero Trust Network Access capabilities in order to achieve anywhere accessibility, operational agility and compliance is crucial.

A recent cybersecurity poll suggests that upwards of 43% of organization plan to implement Zero Trust Access and Gartner recommends piloting ZTNA projects as part of a cloud strategy. With core features of continuous identity, device, security state verification, conditional access policies, and end-to-end analytics – it’s time to add software defined perimeter (SDP) to your tech stack. How can you best fortify hybrid IT and multi-cloud access for users and further leverage existing processes, resources and infrastructure investments?

Join our expert, practitioner panel to examine the why, what, where and how of SDP and explore:

  • Why is ZTNA adoption growing and what advantages does SDP architecture offer
  • How to advance Continuous Adaptive Risk and Trust Assessment (CARTA)
  • What use cases best apply to SDP and why will it co-exist with other ZTNA technologies
  • Where ZTNA controls support comply-to-connect and NIST Cybersecurity Framework
  • How SDP works, deployment options and a reference platform for hybrid IT and multi-cloud access

Invited to speak:

  • Gerald J. Caron III, Director of Enterprise Network Management, Bureau of Information Resources, U.S Department of State
  • Mike Riemer, Global Chief Security Architect at Pulse Secure

Pulse Secure

Your e-mail address is used to communicate with you about your registration, related products and services, and offers from select vendors. Refer to our Privacy Policy for additional information.