“Zero trust networking” has, in the past 18 months, become one of the hottest buzzwords in the cybersecurity industry. And while the highest level of what a move to zero trust entails is well-understood by most security practitioners, the actual “how” isn’t always as obvious. Building policies based on an application-centric view requires the applications to be accurately and consistently identified throughout the environment. This demands a system by which a zero trust platform can develop those identities.
There are four keys to developing application identities for zero trust:
Edgewise Chief Data Scientist John O’Neil, Agent Developer Pete Nahas, and Director of Marketing Operations Adam Sell will host a conversation on the role of application identity in zero trust and how organizations can begin to use application identities to secure their cloud or data center.
Chief Data Scientist,