Attivo Networks Events and Webinars
How to Utilize Attivo in a Zero Trust Architecture
May 11 @ 10:00 am - 11:00 am PDT
As organizations increasingly move to cloud services, have more work locations, adopt Bring-Your-Own-Device policies, and deploy Internet of Things (IoT) devices into their networks, their traditional way to protect a network perimeter must change. The castle-and-moat model of hardening network perimeters to prevent a compromise can no longer effectively provide security in a world of increasingly advanced and sophisticated threats. The Zero Trust model of security arose to address these threats. Implementing a fully executed Zero Trust architecture is likely beyond the reach of most organizations today. However, by starting with individual capabilities that operate in complementary layers within the Zero Trust model, organizations will realize many benefits from an architecture built on conditional access control.
Most organizations will start Zero Trust with a focus on users and devices. Attivo Networks adds another layer of access control that focuses on applications and data to protect authorizations.
Starting with an assumed breach posture, you’ll learn how Attivo deployed early in a ZT scenario can provide visibility into unauthorized queries and protect against unauthorized use for
- Cached credentials – Ensure that credentials only accessible to their directly related applications
- Active Directory – Protect privileged AD objects from unnecessary queries and alert to suspicious activity
Date: Wednesday, May 11, 2022
Time: 10:00 a.m. PDT/1:00 p.m. EDT
Presenters: Robert Crisp, VP of Technical Services, Attivo Networks
Greg Pergament, Director of Sales Engineering, Attivo Networks
Darrin Mourer, Senior System Engineer
*Playback recordings will not be made available for these sessions.