Name
Applying Zero Trust to Network Access: Controlling WHO and WHAT is On Your Network
Speakers

Description
With the proliferation of devices on the network and the movement of employees, vendors, and guests across networks, controlling who and what connects to your network is both more challenging and more important for maintaining security. Come learn how you can keep your network safe and secure from IoT devices, stolen passwords, and unpatched laptops. Know who and what is connecting and allow them policy-based, least-access privileges.
Location Name
Zero Trust Network Access
Session Type
OnDemand
4 - Zero Trust Network Access
Session Category
Zero Trust Access