Defining the Zero Trust and SASE Relationship

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log in
Sign up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

By taking a Zero Trust approach, security departments assume that all content–regardless of whether it originates from a trusted source–is untrustworthy. Treating all content as if it is malicious eliminates the need to make an allow-or-block decision at the point of a click. With cyber-attacks and data breaches becoming more prevalent since the shift to remote working, traditional detect-and-remediate approaches to cybersecurity are falling short and security leaders are increasingly adopting Zero Trust as a way to overcome the challenges presented by the anywhere, anytime workforce. 

In addition, amid growing cloud adoption, many security leaders are looking to introducing Secure Access Service Edge (SASE) architecture into their organizations. Is there a tie between Zero Trust and SASE? Does SASE come in a box? Do you need to choose between one or the other? During this session, a panel of experts will tackle these questions and discuss: 

  • Why focusing on detection is a reactive approach to security
  • The relationship between SASE and Zero Trust
  • Why isolation is the secret sauce in today’s fight against online security threats

>> Log in or complete this short form to register >> 

Speakers

Photo of James Coker

James Coker

Deputy Editor, Infosecurity Magazine

Photo of Diana Kelley

Diana Kelley

CISO, Protect AI

Photo of Jonathan Lee

Jonathan Lee

Sr. Product Manager, Menlo Security

Photo of Matt  Lorentzen

Matt Lorentzen

Principal Consultant, Cyberis

Brought to you by

Should you watch this webinar your information may be shared with the sponsors indicated above. Please see the privacy policy for Menlo Security here: https://www.menlosecurity.com/privacy-policy/. Please see Infosecurity Magazine’s privacy policy for more information.