Zero trust  and  the ID-based cybersecurity perimeter

Zero trust and the ID-based cybersecurity perimeter

Rapid7
Published by: Research Desk Released: Nov 02, 2020

The rapid adoption of cloud-first strategies — across multiple cloud computing flavors (SaaS, PaaS, IaaS, and more) — combined with the sudden uptick in work-from-home environments hastened employees’ need for access to apps and other IT resources from anywhere. These events require companies to consider a new cybersecurity perimeter. It’s not that network-based protection/detection controls are dead: they are simply inadequate for a Zero Trust security approach.

This webinar will discuss:

• the impact of cloud first;

• how organizations are adopting identity-based perimeters as a fundamental Zero Trust building block; and

• the implications for Identity and Access Management tooling moving forward.