zero trust security

Results 26 - 36 of 36Sort Results By: Published Date | Title | Company Name
Published By: MuleSoft     Published Date: Sep 11, 2019
Artificial intelligence (AI), the internet of things (IoT), and security technologies are set to disrupt every industry in the next decade. To get there, leading organizations like McDonald’s, Uber Eats, and HSBC have built adaptable digital platforms via APIs. In the ebook, MuleSoft founder Ross Mason shares his point of view on how to build a thoughtful API strategy that will help your organization take full advantage of emerging technologies like AI, chatbots, and IoT without compromising on security. Download this ebook to learn: How to unlock AI customer insights with an API strategy. How to make APIs the bedrock of IoT development. Why zero trust is key to API security in the new API economy.
Tags : 
    
MuleSoft
Published By: NetIQ     Published Date: Jul 27, 2011
In this on-demand webinar, John Kindervag, Senior Analyst at Forrester Research, defines "zero-trust architecture," outlines the 5 steps needed to make this model actionable, and explains how his clients are adopting a "zero-trust architecture."
Tags : 
zero trust, netiq, advanced threats, apt prevention, cybercrime, incident response, network analysis and visibility, network forensics
    
NetIQ
Published By: Centrify Corporation     Published Date: Jan 22, 2018
Centrify redefines security from a legacy static perimeter-based approach to protecting millions of scattered connections in a boundaryless hybrid enterprise. As the only industry recognized leader in both Privileged Identity Management and Identity-as-a-Service, Centrify provides a single platform to secure every user’s access to apps and infrastructure in today’s boundaryless hybrid enterprise through the power of identity services.
Tags : 
    
Centrify Corporation
Published By: Centrify Corporation     Published Date: Apr 13, 2018
With compromised credentials as today’s #1 threat vector, and the premium hackers place on privileged access, status quo is a treacherous security path to remain on. This eBook looks at what’s behind the privilege crisis, helps you assess how your privileged access management strategy stacks up and proposes a rethink in your approach — one that better addresses the needs of the hybrid enterprise. It explores ways to strengthen your company’s identity maturity with a Zero Trust approach and proven best practices that reduce your risk of a security breach.
Tags : 
    
Centrify Corporation
Published By: Centrify Corporation     Published Date: May 03, 2018
Watch this webinar On-Demand: Cybersecurity is broken. Trust is the enemy. An entirely new approach is required — one based on Zero Trust. Championed by industry leaders including Google, Forrester, Gartner and Centrify, Zero Trust Security verifies every user, their device, and gives just enough access and privilege.
Tags : 
    
Centrify Corporation
Published By: Centrify Corporation     Published Date: Apr 13, 2018
A Zero Trust approach to security requires a combination of Identity Services to deliver identity assurance, trusted endpoints, conditional policy and least privilege. This guide identifies the specific capabilities you need within four key areas of identity and helps you compare capabilities across major vendors with respect to Application Services, Endpoint Services, Infrastructure Services and Analytics Services.
Tags : 
    
Centrify Corporation
Published By: Centrify Corporation     Published Date: Jun 07, 2018
Centrify is pleased to be recognized by 451 Research as one of the early vendors to embrace the ‘zero trust’ concept, a new conceptual framework on the rise as traditional security tactics that follow a hardened perimeter approach have failed. This report examines Centrify’s Zero Trust Security approach, as well as explores its Next-Gen Access platform, which “provides a solid foundation for enterprises setting out on their zero-trust journey”.
Tags : 
    
Centrify Corporation
Published By: IBM     Published Date: Jul 15, 2015
This paper evaluates the market’s readiness for Zero Trust concepts and technologies, based on Forrester’s own market data and a custom study of the same audience.
Tags : 
intrusion prevention system, encrypted tunnels, it security, security management, network analysis, visibility capabilities, compliance, disaster recovery
    
IBM
Published By: IBM     Published Date: Oct 06, 2015
Discover the new Zero Trust Model approach to security and how intrusion prevent systems (IPS) are important due to its visibility, alerting and protection capabilities.
Tags : 
ibm, zero trust model, zero trust, information security, intrusion prevent systems, ips, security, data protection
    
IBM
Published By: IBM     Published Date: Apr 20, 2017
There's an old saying in information security: "We want our network to be like an M&M, with a hard crunchy outside and a soft chewy center." For today's digital business, this perimeter-based security model is ineffective against malicious insiders and targeted attacks. Security and risk (S&R) pros must eliminate the soft chewy center and make security ubiquitous throughout the digital business ecosystem — not just at the perimeter. In 2009, we developed a new information security model, called the Zero Trust Model, which has gained widespread acceptance and adoption. This report explains the vision and key concepts of the model. This is an update of a previously published report; Forrester reviews and updates it periodically for continued relevance and accuracy.
Tags : 
resource management, product data, remote services, asset management, cloud management, web applications, application scheduling, internet of things
    
IBM
Published By: IBM     Published Date: Jul 15, 2016
Discover the new Zero Trust Model approach to security and how intrusion prevent systems (IPS) are important due to its visibility, alerting and protection capabilities.
Tags : 
technology, security, information technology, best practices, ips, zero trust model, business intelligence, business management
    
IBM
Previous    1 2     Next   
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.