Protecting assets critical to an organization's continued operations, without impeding productivity, is a boardroom balancing act. Traditional approaches to security attempt this balance using fixed security perimeters bolted onto existing IT infrastructure. This approach relies on an outdated model that assigns trust to the device, and not to the user. This approach fails in a perimeter less world where cloud, mobility and purpose-built devices are fluid and dynamic, while the identity of the user is unchanging
You need a new, preemptive approach to security that creates a perimeter less network that is resilient and survivable. This approach requires you to identify assets critical to your continued operations and making them accessible to only protected communities of trusted users. It requires risk management through the implementation of policies and controls that are translatable across organizational silos ' each with competing tactical objectives. Finally, the new approach must scale to support dynamic and transformative IT needs, regardless the size of the organization.
By the end of the session, attendees will:
-- Understand the failures of the 'bolt-on ' security approach.
-- Learn key characteristics of a survivable network
-- Key steps to building resilience and survivability with microsegmentation, without dismantling the existing network investments
-- Get an overview of the tools required to align threat response with business objectives.
-- A live demo of Stealth Microsegmentation.