Cover von Understanding Zero Trust wird in neuem Tab geöffnet
E-Medium

Understanding Zero Trust

0 Bewertungen
Verfasser: Suche nach diesem Verfasser Shore, Malcolm
Jahr: 2021
Verlag: LinkedIn
Mediengruppe: E-Medium
Vorbestellbar: Ja Nein
Voraussichtlich entliehen bis:
Link zu einem externen Medieninhalt - wird in neuem Tab geöffnet

Exemplare

StandorteMediengruppeStatusVorbestellungenFristSignaturfarbeInteressenkreis
Standorte: Onlinebibliothek Mediengruppe: E-Medium Status: Online verfügbar Vorbestellungen: 0 Frist: Signaturfarbe:
 
Interessenkreis:

Inhalt

The traditional model of a firewalled enterprise separating trusted insiders from untrusted outsiders worked effectively for years, but it's no longer a viable option in today's world. Workers working remotely, insider threats, and attackers taking advantage of trust between internal systems-these demand a new approach to extending protection to all users and their devices, regardless of their location. In this course, Malcolm Shore shows how to better protect your networks and systems by adopting what's known as a zero trust approach to access control-removing trust relationships in networks and requiring that trust decisions are made at the time that access is requested. Malcom starts with a brief history of the concept of software trust, before moving onto key facets of the zero trust approach, the reasons for wanting to minimize trust relationships in network architectures, and the tenets and models that have been proposed for zero trust.

Bewertungen

0 Bewertungen
0 Bewertungen
0 Bewertungen
0 Bewertungen
0 Bewertungen

Details

Verfasser: Suche nach diesem Verfasser Shore, Malcolm
Jahr: 2021
Verlag: LinkedIn
Suche nach dieser Systematik
Suche nach diesem Interessenskreis
Beschreibung: 00:52:02
Suche nach dieser Beteiligten Person
Sprache: Englisch
Mediengruppe: E-Medium