Zero trust is a response to the modern enterprise reality that sees remote users, unmanaged devices (BYOD) and cloud-based applications that are not located within the enterprise perimeter. Zero trust focuses on protecting resources (assets, services, workflows, network accounts), not network segments, as the network location is no longer a reliable indication of user identity.
Learn from Telstra and F5 security experts why Zero Trust architecture has become necessary to stop breaches. We'll discuss:
Vijay Pinto
Manager of Corporate Security,
Telstra
John McInnes
Systems Engineer,
F5