The rapid adoption of cloud-first strategies — across multiple cloud computing flavors (SaaS, PaaS, IaaS, and more) — combined with the sudden uptick in work-from-home environments hastened employees’ need for access to apps and other IT resources from anywhere. These events require companies to consider a new cybersecurity perimeter. It’s not that network-based protection/detection controls are dead: they are simply inadequate for a Zero Trust security approach.
This webinar will discuss:
• the impact of cloud first;
• how organizations are adopting identity-based perimeters as a fundamental Zero Trust building block; and
• the implications for Identity and Access Management tooling moving forward.