Zero-Trust Networking Is Facilitating Cloud Transformation

Posted on in Presentations

The CIO’s journey to a cloud-first strategy. The endgame is one where applications are hosted in the cloud and visible only to authorized users. Real-world examples of success provided. The cloud becomes the data center. The Internet becomes the corporate network. With some dire consequences for traditional network security appliance vendors who lag behind the curve.

Learning Objectives:
1: Learn how cloud transformation is now an imperative.
2: Learn how cloud security is disrupting traditional hardware appliance markets.
3: Gain new understandings through the experience of 16 different organizations.

Familiarity with enterprise IT.

Richard Stiennon


Chief Research Analyst, IT-Harvest

Security Strategy & Architecture Mobile & IoT Security Business Perspectives Application Security & DevOps

policy management Internet of Things infrastructure security identity management & governance access control



Share With Your Community