Red Binocular Image

Real Zero Trust Architecture Includes Validation 


June 29, 2021
10:00 a.m. PT / 1:00 p.m. ET
45 Minutes
Summary

Zero Trust Architecture is needed today due to the proliferation of cloud, BYOD, and work-from-home environments. There is no longer a well-defined corporate network perimeter to defend. Zero trust requires a suite of capabilities including ongoing verification, segmentation, and control, with a focus on least access privileges. Zero trust capabilities must be implemented in a complete and coordinated way to be effective for both users and devices. At the same time, Zero Trust configuration can be complex. Even the best-architected environments must be continuously checked and validated for coverage gaps with specific recommendations to remediate. In this webinar, Fortinet and Keysight join forces to discuss their best practices for architecting, deploying, and validating a Zero Trust environment.
Speakers
Greg Copeland
Greg Copeland
Director, Business Development
Keysight Technologies
Peter Newton
Peter Newton
Sr. Director of Product Marketing
Fortinet

By clicking “Submit” you are providing Keysight with your personal data.

For information on how we use this data, see the Keysight Privacy Statement link at the bottom of this page.
By submitting your registration, you agree to provide your personal data to Keysight. For information on how we use yourpersonal data and the choices you have, please review Keysight's Privacy Statement.

Learn more about our commitment to privacy:  Keysight Privacy Statement
©   Keysight Technologies