People are not just working from where we thought they would, not anymore. They have become very mobile. This manifested itself in more locations accessing VPNs, SaaS applications and VDI gateways. There are also many more devices accessing our systems. Who do we trust and do we trust where they are from? This is where ZERO trust comes in. Which means, we don’t trust anyone from anywhere. We must perform additional checks to make sure that any connections have approved location, devices are approved of and users are authenticated. We don’t just let anyone connect from any device. Encrypting endpoints is also a key point in case there is loss or theft of devices, which is a much higher risk with mobile users. How do we go about getting all of this done without overwhelming our system? Join us for this very informative session.
Menu