Cryptzone Presents ‘The Software Defined Perimeter: Creating an Invisible Infrastructure’ at Infosecurity Europe

Share Article

Session to Highlight how Organizations Leverage a ‘Zero Trust’ Model to Improve Access Control for Cloud and Hybrid Environments

Cryptzone Logo

Cryptzone to Present ‘The Software Defined Perimeter: Creating an Invisible Infrastructure’ at Infosecurity Europe

Rather than pretend they still have a perimeter, organizations must consider leverage new security paradigms, like SDP and Zero Trust, if they want to preempt threats. These models can be implemented leveraging an organization’s existing infrastructure.

(Infosecurity Europe Conference, Booth #F226) Cryptzone, a provider of dynamic, context-aware network, application and content security solutions, will present a session in the Technology Showcase at Infosecurity Europe on how to leverage a Software Defined Perimeter (SDP) approach, to create an invisible infrastructure for cloud and hybrid environments.

Who:     Jamie Bodley-Scott, global product manager, Cryptzone
What:     The Software Defined Perimeter: Creating an Invisible Infrastructure
When:     14.00 Thursday June 4
Where:     Technology Showcase at Infosecurity Europe

Bodley-Scott will provide a history on the SDP model, which evolved from work done at the Defense Information Systems Agency (DISA) under the Global Information Grid (GIG) Black Core Network initiative, as well as compare it to other models, including De-Perimeterization and Zero Trust. He will also demonstrate how companies leverage these models to solve evolving access control needs. Attendees will learn how to make their application and server infrastructure effectively “invisible” and grant access only to authorized, verified resources on a case-by-case, session-by-session basis.

“According to a recent Cryptzone survey conducted with TechValidate, 90% of companies are using aging VPN technology for network access control,” said Bodley-Scott. “That’s a flawed model that no longer works in an era of the cloud, BYOD and the Internet of Things. Rather than pretend they still have a perimeter, organizations must consider leverage new security paradigms, like SDP and Zero Trust, if they want to preempt threats. These models can be implemented leveraging an organization’s existing infrastructure, which speeds adoption.”

To find out more, speak with the Cryptzone technology team at the Infosecurity Europe Conference in booth #F226.

About Cryptzone
Cryptzone secures the enterprise with dynamic, context-aware security solutions that protect critical services, applications and content from internal and external threats. For over a decade, enterprises have turned to Cryptzone to galvanize their Cloud and network security with responsive protection and access intelligence. More than 450 public sector and enterprise customers, including some of the leading names in technology, manufacturing and consumer products trust Cryptzone to keep their data and applications secure. For more information, go to http://www.cryptzone.com or follow us @Cryptzone.

Share article on social media or email:

View article via:

Pdf Print

Contact Author

Jessica Morris

Irena Mroz
Visit website