Let’s talk about trust–or more accurately, the lack of it. Zero trust is the notion that just because someone has tunneled a VPN to your front door, you shouldn’t have to give them full access to everything on the network.
A zero trust model is supposed to give you more fine-grained control around who gets access to what, based on criteria you choose, including the user, the device, location, application type, whether that app is on premises or in the cloud, and so on.
The problem is that while zero trust may sound good, it can be difficult to implement. In this episode we dive into the tricky bits of zero trust, and figure out ways to make it feasible in your environment. Our guest is Jay Klauser, VP of Worldwide Sales Engineering & Alliances at NetMotion. NetMotion is our sponsor for today’s show.
* NetMotion’s heritage with session persistence
* The limits of the traditional remote access VPN
* How the NetMotion client provides visibility & policy flexibility
* Bringing a zero-trust approach to a traditional remote access environment
* Blending performance monitoring with security
* Adapting access policies for hybrid work environments
Download the NetMotion SDP Report to see how a zero trust architecture could fit into your organization. Go to netmo.io/packetpushers to register and get your copy.
The Enterprise Mobility Blog – NetMotion
NetMotion on LinkedIn
@NetMotion – NetMotion on Twitter
@netmotionsoftware – NetMotion on Instagram
NetMotion on Facebook