World events are generating a seismic shift in the way in which organizations enable their mission owners with rapid and secure access to critical applications. With social distancing in full effect, it is more critical than ever for organizations to shift towards Zero Trust access models. Let's look beyond the marketing hype to implement extensible, secure access, to applications and infrastructure while reducing friction. '
How do we move beyond the long tail of legacy access methodologies? We'll discuss:
- Zero Trust Access Models
- Identity Aware Proxy
- Applied Machine Learning & AI to for advanced defenses against automated attacks and abuse.
A panel discussion with Chris Edmundson (SANS), Corey Marshall (F5), Todd Namba (F5), and Jeff Benton (One-Technology).