Defining the Zero Trust and SASE Relationship

Register Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log In

Sign Up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

By taking a Zero Trust approach, security departments assume that all content–regardless of whether it originates from a trusted source–is untrustworthy. Treating all content as if it is malicious eliminates the need to make an allow-or-block decision at the point of a click. With cyber-attacks and data breaches becoming more prevalent since the shift to remote working, traditional detect-and-remediate approaches to cybersecurity are falling short and security leaders are increasingly adopting Zero Trust as a way to overcome the challenges presented by the anywhere, anytime workforce. 

In addition, amid growing cloud adoption, many security leaders are looking to introducing Secure Access Service Edge (SASE) architecture into their organizations. Is there a tie between Zero Trust and SASE? Does SASE come in a box? Do you need to choose between one or the other? During this session, a panel of experts will tackle these questions and discuss: 

  • Why focusing on detection is a reactive approach to security
  • The relationship between SASE and Zero Trust
  • Why isolation is the secret sauce in today’s fight against online security threats

>> Log in or complete this short form to register >> 

Speakers

Diana Kelley

CTO and co-founder, SecurityCurve

Jonathan Lee

Sr. Product Manager, Menlo Security

Matt  Lorentzen

Principal Consultant, Cyberis

    Brought to You by

    Should you register for this event your information will be shared with the sponsor indicated above. See our privacy policy for more information.