The zero trust security model is having a moment. The concept that devices should not be trusted by default, even inside the network perimeter, has been around for over a decade. The proliferation of remote work in the last few years has made the concept critical. With all of the threats inside and outside our organizations today, every IT manager needs to be implementing zero trust.
But what exactly is zero trust, what are its tenets, what are the real-world best practices (and gotchas) and what else do IT managers need to know? Join the editors of Virtualization & Cloud Review and Redmondmag.com for this free, half-day virtual summit bringing together independent experts who will walk you through what zero trust is and the best ways to implement it in your enterprise.