+

Zero Trust Through Dynamic Authorization And Policy Driven Access

Brought to you by KuppingerCole and Axiomatics

Recorded: Thursday, August 19, 2021

Presenters: John Tolbert, Dr. Srijith Nair, and Jim Barkdoll

How authorization management enables Zero Trust in your cloud and application security strategy

Join experts from KuppingerCole Analysts, Ericom and Axiomatics for an interactive discussion on the role of fine-grained access controls in adopting Zero Trust and how best to address that challenge to meet the needs of a hybrid workforce using cloud-based applications and adopting new ways of working, such as DevOps.

About the Presenters

John Tolbert, Lead Analyst at KuppingerCole will share his perspective on the Zero Trust approach to security, adoption rates, and why it is important for the digital enterprise. He will also explain how Dynamic Authorization fits into a Zero Trust strategy and quiz the other webinar participants on their experience in this area.

Secure remote access expert and Chief Strategy Officer of Ericom, Chase Cunningham will be joined by Srijith Nair, Chief Strategy Officer and Jim Barkdoll, Chief Commercial Officer at Axiomatics to discuss how Dynamic Authorization and other technologies like Remote Browser Isolation (RBI) and Zero Trust Network Access (ZTNA) can be integrated into a Zero Trust approach.

Watch the Webinar


Other Resources

Webinars
The Convergence of Cloud, DevOps and Access Control
Security experts from industry-leading NTT DATA and Axiomatics are making a deep dive into migrating access control to the cloud. Follow the demonstration of how to set up a project for containerization using ALFA and Jenkins.
Webinars
ABAC as code – Applying Modern DevOps to Policy Authoring
A DevOps approach to externalized business policy engineering can ensure modern CI/CD processes help IT adoption of access control policy authoring.
Webinars
Taking an identity-centric approach to a modern security architecture
Federal agencies invest heavily in protecting data from external threat actors, but the insider threat problem requires a new approach to access control. While protecting data is paramount, that requirement must be balanced with the need to share certain information across a variety of use case scenarios within and across agencies/departments.