Best Practices for Achieving a Zero Trust Deployment

53 Views
Published
We hear the term "zero trust" quite a bit in today's industry marketing. But the reality of it is that there is no product or even set of products that can in themselves provide for a zero trust environment. Much like proper security postures, zero trust requires the establishment of a practice that needs to become embedded into the organization in question. Technology does indeed play an important role, but it is secondary to the establishment of a “zero trust practice”. This session will discuss aspects of zero trust. What is it? How does it become established and finally what products and solutions from Extreme Networks can assist in supporting the overall practice? Buckle in for an interesting ride!

To learn more, please visit: https://www.extremenetworks.com/solution/security/?utm_campaign=FY21_Virtual_Extreme_Conference_2020_POST-EVENT&utm_medium=Referral&utm_source=youtube.com&utm_content=

Speaker:
-Ed Koehler, Distinguished Systems Engineer
Category
Extreme Networks
Tags
extremenetworks, technology, it solutions
Be the first to comment