Recorded on Tuesday, June 16, 2020
The federal government is adopting Zero Trust as its cybersecurity strategy, a security model that increases cyber defenses by narrowing the defenses from a wide network perimeter to micro-perimeters. Along with the United States Department of Defense’s (DoD) largest cloud migration in history for the Joint Enterprise Defense Infrastructure (JEDI) project, building a Zero Trust Security Visibility Architecture is as critical now as ever.
We will review Zero Trust network requirements, Zero Trust Framework and best practices for implementing a Zero Trust Visibility Fabric. We will also review how to monitor and maintain a Zero Trust Environment once you have it in place. Lastly, as part of the visibility fabric, we will review and demo how Garland Prisms allows organizations and government agency networks, to access, process and deliver packet-level traffic from VMs, containers, and Kubernetes in AWS, Azure, Google or any cloud environment. Including how Garland Prisms can send that virtual traffic to your incident response, intrusion detection, forensics tools. Empowering sec ops teams migrating to the cloud to make quick sense of their virtual traffic and move at the speed of attack.
If you are responsible for IT security, data center operations, or looking into the JEDI migration to the cloud, then this webinar is for you.
Missed it? Watch the on-demand video here!
- What is the Zero Trust strategy
- Zero Trust Network Requirements
- What is the Zero Trust Framework
- The benefits of a Zero Trust Visibility Fabric
- How to monitor and maintain a Zero Trust environment
- How to acquire, process, and distribute packets in the cloud
- Live demo of Garland Prisms Traffic Mirroring and TLS Decryption
Harry Berridge, Director of Federal Operations, Garland Technology
Neil Wilkins, Systems Engineer, EMEA Region, Garland Technology
Mark Lennon, Technical Product Marketing, Garland Technology
Download on-demand webinar here!