The overall concept of zero trust security is relatively straightforward. Achieving it, on the other hand, is not. Yet for any organization with a digital footprint, zero trust is critical to keeping a system secure and running at its best. Join this three-part webinar series as F5 defines zero trust security principles, distills its best practices, introduces next-gen approaches, and outlines how organizations can adopt it.
This upcoming event will qualify for (ISC)2 CPE credits. As an approved (ISC)2 CPE Submitter Partner we will submit for CPE credits on your behalf.
The overall concept of zero trust security is relatively straightforward. Achieving it, on the other hand, is not. Yet for any organization with a digital footprint, zero trust is critical to keeping a system secure and running at its best. Join this three-part webinar series as F5 defines zero trust security principles, distills its best practices, introduces next-gen approaches, and outlines how organizations can adopt it.
Zero trust uses technology to achieve three distinct goals: to enforce transactional constraints; give situational awareness to the human system operators; and perform advanced risk-reduction and remediation.
Zero trust security must extend holistically across the full application, infrastructure, and delivery stack, while spanning the complete development pipeline. Creating that holistic layer of protection can be daunting to even the most skilled security professionals. But adopting certain security techniques, technologies, and best practices provides a critical foundation for zero trust.
Zero trust is driven by a simple philosophy: Never implicitly trust; always verify; and continuously monitor. And zero trust-based security is achieved by applying zero trust principles across the entire security stack, application delivery stack, and the application development lifecycle.
We’ll cover how to achieve zero trust with security solutions that offer continuous monitoring of payload in transaction between users and workloads, and those that occur among workloads with WAF in appropriate form factor, as well as machine-learning based identification of anomalies and automated calculation of risk for HTTP/S transactions.
Corey Marshall
Director, Solutions Engineering
F5
Mudit Tyagi
Director Security
F5
Ken Arora
Distinguished Engineer
F5