Zero Trust Network Access as one of the basic pillars of security in today's digital world
As it becomes increasingly common nowadays for users to work from anywhere and the number of IOT devices is on the rise, it is necessary to constantly authenticate all users and devices as they access enterprise applications and data.
To protect them, administrators must introduce so-called zero trust access and provide the least access rights. Implementing such an approach involves the need for strong authentication features, network access control tools, and application access security policies.
To protect them, administrators must introduce so-called zero trust access and provide the least access rights. Implementing such an approach involves the need for strong authentication features, network access control tools, and application access security policies.
Sign in to Autumn ITAPA 2024
Peter Kočík
Peter Kočík is a Systems Engineer for CEE in the company Fortinet. His FortiHistory started in 2007 when he was building managed security services for Slovanet company. He was one of the first evangelists of Fortinet technologies in Slovakia. He is involved with security for more than 10 years and many customers and partners acknowledge his broad presales and implementation knowledge.
See more info about the speaker