In the last decade, the Zero Trust Architecture (ZTA) has established itself as the new standard for IT security: if the basic concepts of ZTA have remained unchanged, the architecture itself has evolved a lot during the same period to add to the initial concept of micro-segmentation components of identity, systems, contextual telemetry, feedback loop, continuous evaluation, etc.
Having supported many companies in their efforts to deploy their ZTA in the last 10 years, we must admit that few of them have been able to set it up despite their real desire to adopt it. This failure is mainly due to the complexity of the underlying infrastructure required by ZTA.
In parallel to the evolution of ZTA we witnessed the adoption of cloud computing and its principles, enabling IT organizations to transition from managing infrastructure to focus on application and services.
What happens when we use cloud computing to offer the ZTA in service mode? A democratized access to the implementation of a ZTA in your environment
This session is intended for chief technology and security officers, cloud, network and security specialists, as well as enterprise and application architects.