ON-DEMAND WEBINAR

Why use a Zero Trust Identity Aware proxy?

Zero trust is a response to the modern enterprise reality that sees remote users, unmanaged devices (BYOD) and cloud-based applications that are not located within the enterprise perimeter. Zero trust focuses on protecting resources (assets, services, workflows, network accounts), not network segments, as the network location is no longer a reliable indication of user identity.

Learn from Telstra and F5 security experts why Zero Trust architecture has become necessary to stop breaches. We'll discuss:

  • Why we need to change the way we think about user privilege
  • New F5 technologies to continuously assess trust
  • Telstra’s evolution from perimeter control to application control

Speakers


Vijay Pinto
Manager of Corporate Security,
Telstra


John McInnes
Systems Engineer,
F5

Thank you for registering. You will receive a confirmation email shortly.