Artwork

Content provided by Mariela leibovich and Cato Networks. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Mariela leibovich and Cato Networks or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

Under lock and key. The principles of zero-trust

24:44
 
Share
 

Manage episode 346922352 series 3378240
Content provided by Mariela leibovich and Cato Networks. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Mariela leibovich and Cato Networks or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
With legacy network solutions based on VPN, authenticated users used to gain access to everything on the same subnet. Only a password prevented unauthorized users from accessing a resource. Zero trust flipped that paradigm by allowing users to only “see” the specific applications and resources explicitly permitted by their company’s security policy. Where did zero trust come from and why should you care? Today’s guest is Bill Carter, Cato Networks’ sales engineer. We’ll talk about the principles of zero-trust, verification processes and how does a proper ZTNA architecture should look like.
  continue reading

18 episodes

Artwork
iconShare
 
Manage episode 346922352 series 3378240
Content provided by Mariela leibovich and Cato Networks. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Mariela leibovich and Cato Networks or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
With legacy network solutions based on VPN, authenticated users used to gain access to everything on the same subnet. Only a password prevented unauthorized users from accessing a resource. Zero trust flipped that paradigm by allowing users to only “see” the specific applications and resources explicitly permitted by their company’s security policy. Where did zero trust come from and why should you care? Today’s guest is Bill Carter, Cato Networks’ sales engineer. We’ll talk about the principles of zero-trust, verification processes and how does a proper ZTNA architecture should look like.
  continue reading

18 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Quick Reference Guide