Library Hours
Monday to Friday: 9 a.m. to 9 p.m.
Saturday: 9 a.m. to 5 p.m.
Sunday: 1 p.m. to 9 p.m.
Naper Blvd. 1 p.m. to 5 p.m.
     
Limit search to available items
Results Page:  Previous Next
Author Barth, Doug, on-screen presenter.

Title What are the common challenges to adopting a zero trust network model? / with Doug Barth and Evan Gilman. [O'Reilly electronic resource]

Publication Info. [Place of publication not identified] : O'Reilly, [2017]
QR Code
Description 1 online resource (1 streaming video file (6 min., 16 sec.))
Performer Presenters, Doug Barth and Evan Gilman.
Note Title from title screen (viewed September 7, 2017).
Date of publication from resource description page.
Summary "Once you know what a zero trust network is, and what the advantages and disadvantages of moving to this model are, the next step is to understand some of the common challenges that you will face in implementing zero trust as a security model. Evan Gilman and Doug Barth discuss these challenges, and give suggestions on how to overcome them. You will get tips on why to involve more than just your security team, why implementing policy as code is important, understanding why you should evaluate policies for their impact and value, and the overall scale of change involved in moving from a perimeter model to a zero trust model."--Resource description page
Subject Computer networks -- Security measures.
Réseaux d'ordinateurs -- Sécurité -- Mesures.
Computer networks -- Security measures.
Added Author Gilman, Evan, on-screen presenter.
Patron reviews: add a review
EVIDEO
No one has rated this material

You can...
Also...
- Find similar reads
- Add a review
- Sign-up for Newsletter
- Suggest a purchase
- Can't find what you want?
More Information