Miktysh Blog.
Your go-to source for everything records management, eDRMS, Office 365, TRIM/Content Manager, RecordPoint, AvePoint, and EncompaaS related.
Categories
Topics
The New Normal Requires Zero Trust
Jun 27, 2021 | Digital Transformation, Information Governance, Information Management
The ‘zero trust’ security emphasizes that enterprises should have a “trusted” internal network and an “untrusted” external network. The adoption of increasing mobile and cloud and the recent pandemic shows that we can no longer have a network perimeter-centric view of security. Instead, we need to securely enable access for the various stakeholders, including employees, partners, contractors, etc., regardless of their location, device, or network. There is no silver bullet in achieving a ‘zero trust’ security architecture. Still, the identity and access management is the core technology that sets the stage for the ‘zero trust’ journey. The ‘people’ become the new perimeter in this journey, with identity-forming the critical component to establishing a secure environment.
In this presentation by Sami Laine from Okta, you will hear about:
· the shifts in the security landscape that paved the way for ‘zero trust’
· how the ‘zero trust’ extended ecosystem will look like today
· building an effective ‘zero trust’ program and architecture for the future.
Liza Tinker
Business Consultant
Liza is a SharePoint consultant with over 15 years’ experience in the private and public sector in the use and delivery of SharePoint and other collaboration solutions using Microsoft 365. She is passionate about technology and improving productivity and quality through collaboration and innovation.
Categories
Topics
Follow us on social
Popular content.