|
EVENT MENU
ZERO TRUST: PLATFORMS
ZERO TRUST
MEETUP LIVE NOW - CLICK HERE
Zero Trust: Platforms
ZERO TRUST
INTRODUCTION TO PLATFORMS: Our Analysts' Overview

Zero Trust is a cybersecurity approach that requires verifying everything before granting access, rather than trusting anything by default. If you're interested in learning more, watch our analysts' review of the current state of multi-capability Zero Trust platforms and what to expect going forward.

Zero Trust Platforms: Demo Rooms

Click on a Vendor Logo to Learn More


Zero Trust Platforms: Vendor Panels

Dr. Chase Cunningham leads a panel discussion with Zero Trust: Platforms experts Crowdstrike, Microsoft and Cisco

Dr. Chase Cunningham leads discussion with experts from iboss, Appgate and Illumio


Zero Trust Platforms: Analyst Briefings

Zero Trust Platforms: Demos
Play Now

The Appgate SDP Architecture

Learn about how the Appgate SDP architecture gives organizations ultimate control and flexibility.
Play Now

Appgate SDP Platform Risk Engine

Learn about the Appgate SDP Zero Trust platform services risk engine and codeless integrations.
Play Now

Metadata and Attribute-Based Access Control

Experience how Appgate SDP uses environment metadata to dynamically create and update policy and entitlements saving you time and effort
Play Now

Appgate SDP Admin Console and policy engine

A brief tour of the admin console and the unified policy engine for all users, devices, and resources regardless of location.
Play Now

Crowdstrike's Adversary Focused Zero Trust

This solution focuses on lateral movement and breach regardless of location or cloud/hybrid environment to visualize, mitigate, and optimize your security posture and protect your assets
Play Now

Demo: Zero Trust with Microsoft Azure AD

Take steps to secure your enterprise while offering your users a better experience. Integrate and protect while achieving a better security posture without sacrificing usability.
Play Now

Demo: Zero Trust with Microsoft Endpoint Manager

Today's diversity of devices creates a massive attack surface area, requiring a strong device compliance posture for secure remote access. If you use Microsoft 365 E3, you already own the technologies for a Zero Trust foundation.
Play Now

Demo: Zero Trust with Microsoft Cloud App Security

The digital revolution and remote work mean that no two sessions look the same. Learn how to protect your apps and workloads with Microsoft's security stack.
Play Now

Simplify achieving Zero Trust with micro-segmentation from Illumio

Traffic flows in the data center can be hugely complex and so creating security rules for that is equally complex. See how to simplify the process to save time and money in achieving Zero Trust.
Play Now
Network Detection & Response made easy

Utilize VMware's NSX Firewall to enable robust Network Detection & Response throughout your organization
Play Now
Mobile Threat Defense with VMware's Workspace ONE

Better secure mobile devices and better protect your company resources utilizing VMware's Workspace ONE Mobile Threat Defense
Play Now
VMware enables Secure Access Service Edge

The evolution of VMware's SD-WAN Technology allows organizations to conduct SASE at scale effortlessly
Play Now
VMware enables Zero Trust Network Access

Provide secure access to applications and company resources that enable you to provide an "anywhere workspace"
Play Now
Find your adversaries with VMware Contexa

A look at how VMware Contexa utilizes your existing tools and enriched signal intelligence to expose adversarial conversations going on in and from your environment
Play Now
The mobile risk matrix

Dan Benjamin
Co-Founder and CEO, Dig Security
Dig Security’s powerful and comprehensive platform is the only solution combining DSPM and DDR to provide data risk visibility in real time to locate, classify, and prioritize data risk in multiple public cloud environments.
Play Now
PLAY NOW Cisco Zero Trust in Action: Unified Access Policy & Segmentation at Scale

See how Cisco ISE uses Security Group Tags (SGTs) to establish trust and enforce trust-based access based on user type (employee vs. contractor) and then integrates this with the Secure Workload access policy. Our solution works for applications that are on premises, as well as in the cloud and can be deployed in both agentless and agent-based implementations.
Play Now
Cisco Zero Trust in Action: Secure Access Management

Watch a day in the life of a user gaining secure remote access to SaaS and private applications by continuously verifying user and device trust using Cisco zero trust technologies such as Duo and Umbrella
ZERO TRUST TECHNOLOGY MAP
X
Cybersecurity Replay! Agenda
---------------------- NEW CONTENT AVAILABLE TODAY ----------------------


TRACK 1
TRACK 2
TRACK 3