Digital Transformation.

Your go-to source for articles and videos on the topic of digital transformation.

Categories

Topics

The New Normal Requires Zero Trust

The New Normal Requires Zero Trust

The ‘zero trust’ security emphasizes that enterprises should have a “trusted” internal network and an “untrusted” external network. The adoption of increasing mobile and cloud and the recent pandemic shows that we can no longer have a network perimeter-centric view of security. Instead, we need to securely enable access for the various stakeholders, including employees, partners, contractors, etc., regardless of their location, device, or network. There is no silver bullet in achieving a ‘zero trust’ security architecture. Still, the identity and access management is the core technology that sets the stage for the ‘zero trust’ journey. The ‘people’ become the new perimeter in this journey, with identity-forming the critical component to establishing a secure environment.

In this presentation by Sami Laine from Okta, you will hear about:
· the shifts in the security landscape that paved the way for ‘zero trust’
· how the ‘zero trust’ extended ecosystem will look like today
· building an effective ‘zero trust’ program and architecture for the future.

read more
Adding Context to Information for Better Records Management

Adding Context to Information for Better Records Management

The ‘zero trust’ security emphasizes that enterprises should have a “trusted” internal network and an “untrusted” external network. The adoption of increasing mobile and cloud and the recent pandemic shows that we can no longer have a network perimeter-centric view of security. Instead, we need to securely enable access for the various stakeholders, including employees, partners, contractors, etc., regardless of their location, device, or network. There is no silver bullet in achieving a ‘zero trust’ security architecture. Still, the identity and access management is the core technology that sets the stage for the ‘zero trust’ journey. The ‘people’ become the new perimeter in this journey, with identity-forming the critical component to establishing a secure environment.

In this presentation by Sami Laine from Okta, you will hear about:
· the shifts in the security landscape that paved the way for ‘zero trust’
· how the ‘zero trust’ extended ecosystem will look like today
· building an effective ‘zero trust’ program and architecture for the future.

read more

Popular posts

Miktysh Records Management Award BRW - Micro Focus Content Manager Support
Miktysh Records Management Award - HP TRIM Support
Miktysh Records Management Award Deloitte
Information Management Award
Telstra Business Award for Records Management Strategy
Award Records Management Strategy - best office 365 apps
Award Records Management Services Australia
Technology Award for Records Management Brisbane
Technology Award for Records Management Brisbane