Zerotrust

play_arrow
181 тыс
3 тыс

3:43

Zero Trust Explained in 4 mins

Zero Trust Explained in 4 mins

IBM Technology

A zero trust approach aims to wrap security around every user, every device, every connection — every time. Unify and integrate ...

play_arrow
4 тыс
313

13:55

Zero Trust Architecture Explained

Zero Trust Architecture Explained

Andrew Hoffman

Zero Trust Architecture is a method of securely designing applications, networks and more as defined by NIST SP-800-207.

play_arrow
141 тыс
2 тыс

57:11

Understanding and Getting Started with ZERO TRUST

Understanding and Getting Started with ZERO TRUST

John Savill's Technical Training

A look at what Zero Trust really is and how to get started. Looking for content on a particular topic? Search the channel. If I have ...

play_arrow
105 тыс
3 тыс

17:59

Cybersecurity and Zero Trust

Cybersecurity and Zero Trust

IBM Technology

With cyber attacks becoming ever more sophisticated, cyber security has become a very hot topic. In this video, Bob Kalka ...

play_arrow
150 тыс
5 тыс

7:44

What is Zero Trust Network Access (ZTNA)? The Zero Trust Model, Framework and Technologies Explained

What is Zero Trust Network Access (ZTNA)? The Zero Trust Model, Framework and Technologies Explained

The CISO Perspective

Zero Trust Network Access (ZTNA) is a technology that is quickly replacing VPN's as a more secure and scalable way to provide ...

play_arrow
35 тыс
483

45:42

Overview of Zero Trust Architectures

Overview of Zero Trust Architectures

MIT Lincoln Laboratory

In this video we de-mystify and explain recent "Zero Trust” approaches to improve the cybersecurity of enterprise, critical ...

play_arrow
49 тыс
1 тыс

21:46

Zero Trust Explained | Real World Example

Zero Trust Explained | Real World Example

CertBros

Disclaimer: These are affiliate links. If you purchase using these links, I'll receive a small commission at no extra charge to you.

play_arrow
6 тыс
76

27:54

Cisco Zero Trust Overview

Cisco Zero Trust Overview

Jason Maynard

High level insight into how Cisco provides an holisitc approach to Zero-Trust. More than a product and a platform based approach ...

play_arrow
64
6

5:50

Cybersecurity vs Blockchain: Who Really Owns the Future of Digital Trust?

Cybersecurity vs Blockchain: Who Really Owns the Future of Digital Trust?

Hire Ready

"Cybersecurity is much more than a matter of IT—it's a business imperative." "The blockchain symbolizes a shift in power from the ...

play_arrow
315 тыс
3 тыс

10:05

Zero Trust - CompTIA Security+ SY0-701 - 1.2

Zero Trust - CompTIA Security+ SY0-701 - 1.2

Professor Messer

- - - - - The strategy of zero-trust can be a effective way to increase the security of an organization's data. In this video, you'll learn ...

play_arrow
2 тыс
77

5:47

Zero Trust - простое объяснение главного Security принципа за 5 минут

Zero Trust - простое объяснение главного Security принципа за 5 минут

StringConcat

Что такое Zero trust. Это не фреймворк и даже не библиотека. Это сдвиг мышления. И, наверное, один из главных Security ...

play_arrow
2 тыс
26

3:02

What is zero trust architecture?

What is zero trust architecture?

Local Government Association

To help councils tackle growing cyber threats, the Local Government Association has released explainer animations on cyber ...

play_arrow
20 тыс
303

4:39

Zero Trust in 5 Minutes with Brian Deitch

Zero Trust in 5 Minutes with Brian Deitch

Zscaler Inc.

VPNs will never be zero trust because they typically grant broad network access to users, and well, users on the network are a ...

play_arrow
2 тыс
75

17:12

Zero Trust Network Access (ZTNA) - современный подход к удаленному подключению сотрудников

Zero Trust Network Access (ZTNA) - современный подход к удаленному подключению сотрудников

Академия Батранкова

00:00:00 Почему важно вашим сотрудникам понимать что такое ZTNA 00:00:47 О чем пойдет речь 00:01:09 VPN и его ...

play_arrow
60 тыс
596

2:12

Zero Trust Explained

Zero Trust Explained

Microsoft Security

By implementing Zero Trust, you can reduce risk, build trust, and improve protection across your identities, devices, applications, ...

play_arrow
2 тыс
30

6:30

Zero Trust SD-WAN Solution Overview

Zero Trust SD-WAN Solution Overview

Zscaler Inc.

Traditional SD-WAN architectures leave security gaps that enable lateral threat movement and expand your attack surface.

play_arrow
35 тыс
1 тыс

6:57

Why Implement Zero Trust

Why Implement Zero Trust

IBM Technology

Moving to a hybrid, multicloud infrastructure means your resources are also likely scattered throughout multiple IT environments ...

play_arrow
2 тыс
66

29:34

Microsoft's Zero Trust Approach

Microsoft's Zero Trust Approach

Microsoft Security Community

Join this conversation with special guest Clay Taylor, as we learn Microsoft's approach to Zero Trust. We explore what Zero Trust ...

play_arrow
6 тыс
63

54:38

AWS re:Inforce 2023 - Steps toward a Zero Trust architecture on AWS (IAM307)

AWS re:Inforce 2023 - Steps toward a Zero Trust architecture on AWS (IAM307)

AWS Events

Modern workplaces have evolved beyond traditional network boundaries as they have expanded to hybrid and multicloud ...

play_arrow
10 тыс
326

32:47

Cybersecurity Zero Trust Architecture : Explained For Beginners

Cybersecurity Zero Trust Architecture : Explained For Beginners

StationX

In this episode, host Nathan House introduces the critical concept of Zero Trust Architecture. He breaks down what it means, why ...