• All
  • Cloud
    • Solutions
    • Virtualization
  • Data
    • Analytics
    • Big Data
    • Customer Data Platform
  • Digital
    • Digital Marketing
    • Social Media Marketing
  • Finance
    • Cost Management
    • Risk & Compliance
  • Human Resources
    • HR Solutions
    • Talent Management
  • IT Infra
    • App Management Solutions
    • Best Practices
    • Datacenter Solutions
    • Infra Solutions
    • Networking
    • Storage
    • Unified Communication
  • Mobility
  • Sales & Marketing
    • Customer Relationship Management
    • Sales Enablement
  • Security
  • Tech
    • Artificial Intelligence
    • Augmented Reality
    • Blockchain
    • Chatbots
    • Internet of Things
    • Machine Learning
    • Virtual Reality
Zero trust  and  the ID-based cybersecurity perimeter

Zero trust and the ID-based cybersecurity perimeter

Rapid7
Published by: Research Desk Released: Nov 02, 2020

The rapid adoption of cloud-first strategies — across multiple cloud computing flavors (SaaS, PaaS, IaaS, and more) — combined with the sudden uptick in work-from-home environments hastened employees’ need for access to apps and other IT resources from anywhere. These events require companies to consider a new cybersecurity perimeter. It’s not that network-based protection/detection controls are dead: they are simply inadequate for a Zero Trust security approach.

This webinar will discuss:

• the impact of cloud first;

• how organizations are adopting identity-based perimeters as a fundamental Zero Trust building block; and

• the implications for Identity and Access Management tooling moving forward.