The historical approach to business security has focused on defending a fixed perimeter. The objective was to keep threats on the outside of the perimeter of a wall around a castle. However, today the reality is that these same boundaries are harder to define and very porous. The assumption that systems and traffic within a data centre can be trusted is flawed because once a single host is compromised, moving within a trusted zone is often easy. While it is often hard to directly attack high-value assets from outside the network, using an indirect attack using systems inside the network is much simpler, although more time-consuming. These same principles are equally applicable to public cloud deployments.
The Zero Trust architecture is the foundation of the future of public cloud security. The ability to authenticate and secure communication without relying on the location of the endpoints or the security of the network means that organizations can adopt the cloud paradigm and embrace its benefits of cost and flexibility while maintaining control of their data and compliance in virtual environments.
In this webcast, John Kindervag, the creator of the Zero Trust Model, and Unisys experts will introduce concepts associated with the Zero Trust model in the cloud and show how Unisys Stealth ' and Palo Alto Networks provide a unified platform to enhance system survivability and reduce the impact of potential threats.
By the end of this session, attendees will
1. Understand how Palo Alto Networks and Stealth enable the Zero Trust model within the cloud.
2. Understand Palo Alto Networks and Stealth Zero Trust segmentation platform.
3. Understand how this solution can accelerate cloud adoption.
4. Understand methods and metrics by which the next generation of CISO's can define and deliver success in the public cloud.