AuthorAsh Devata, General Manager, Cisco Zero Trust and Duo Security

How Do I Reduce the Risk of An Insider Threat?

The principle of least level of access gives employees just the privileges they need to do their jobs. Limiting what an employee can do is a core tenet of Zero Trust.

How is Zero Trust Evolving to be More Continuous in Verifying Trust?

For zero trust to be successful, organizations need to be able to check user identity, device posture, and overall behavior without adding friction to the experience.

How is Zero Trust Evolving to be More Continuous in Verifying Trust?

For zero trust to be successful, organizations need to be able to check user identity, device posture, and overall behavior without adding friction to the experience.

How Do I Empower a Remote Workforce Without Compromising Security?

To transition to a zero-trust architecture, focus on doing the things that offer the most value.

How Do I Empower a Remote Workforce Without Compromising Security?

To transition to a zero-trust architecture, focus on doing the things that offer the most value.

How Is Zero Trust Different From Traditional Security?

Unlike traditional security approaches, the zero-trust security model verifies a user's identity each and every time they need specific system access.

Removing Friction for the Enterprise With Trusted Access

Our work lives are supposed to be simpler and easier because of technology. At least that’s the promise.

© 2022 Camel Larry

Theme by Anders NorénUp ↑