Devendra Kamtekar, Market Development Lead and Ashish Shrivastava, Technical Specialist, CyberRes
About this talk
Organizations have to protect themselves by recognizing who is trying to access high-value data, and whether or not they should be able to access it. Implementing a Zero Trust approach is a process that involves many products working in concert. NetIQ Identity and Access Management (IAM) helps organizations protect sensitive information by automating privilege and access control to ensure appropriate access to applications, data, and resources. Join us to learn how a Zero Trust approach addresses next generation security challenges.
In this session you’ll learn: • Zero Trust Concepts, including NIST’s “Tenets of Zero Trust Architecture,” • Why Identity is the key differentiator for a successful zero trust program. • How NetIQ maps to those tenets. • How to Embark on a Zero Trust Journey