Accomplishing Zero Trust Security Using SDP

Поделиться
HTML-код
  • Опубликовано: 20 окт 2024

Комментарии • 22

  • @tonyschlyter6262
    @tonyschlyter6262 5 лет назад +17

    I don’t comment on videos often but you have really done a great job of making this a simple resource for the it pro who isn’t a total beginner. Thanks

    • @TheCISOPerspective
      @TheCISOPerspective  5 лет назад

      Thanks for the kind words Tony! That was my goal, and glad you found it beneficial

  • @dermick
    @dermick 5 лет назад +8

    Very good video - well done! One comment - "zero" trust, but you have to trust the SDP client software that's "verifying" the client. Current versions of these often make BYOD difficult or impossible. I feel that there is a lot more innovation possible on the client side.

    • @TheCISOPerspective
      @TheCISOPerspective  5 лет назад +1

      Sorry for the late - completely agree on your comment around client side innovation. SDP clients leave a lot to be desired

    • @Calm_Energy
      @Calm_Energy 4 года назад +1

      The CISO Perspective are there any sdp clients you recommend?

    • @NajQazi
      @NajQazi 4 года назад +2

      ​@@Calm_Energy It comes down to picking a solution from a particular vendor. For example, Cisco has AMP (Advanced Malware Protection). Zscaler has Zscaler Client Connector. Other Security vendors have similar capabilities. As I mentioned earlier, it all comes down to choosing the best security solution and vendor for your environment & business. Hope this helps & good luck!

  • @awaismunawar301
    @awaismunawar301 2 года назад

    This was brilliant. Cleared a few ambiguities in my concept. I can buy you a coffee mate.

  • @Happydrguy
    @Happydrguy 5 лет назад +6

    Excellent video, informative!

  • @bobdavislumbro4047
    @bobdavislumbro4047 7 месяцев назад

    GREAT VIDEO! helped me a lot, question when you say NAC or network access control stops at layer 2, what do you mean by that? same subnet?

  • @Metata40
    @Metata40 6 месяцев назад

    Well done and thanks for your time.

  • @sameersaini3265
    @sameersaini3265 3 года назад +3

    Very well articulated. Small suggestion, if you can do it at a touch slow pace. Someone like me take a time to process the information. Thank you.

  • @easyautomationengine2732
    @easyautomationengine2732 2 года назад

    very very informative Andy, keep it up man

  • @scoogsy
    @scoogsy 4 года назад

    Excellent presentation.

  • @studyit8141
    @studyit8141 Год назад

    Does it play NAC role as well n make NAC as redundant? I mean , can we replace NAC solution in the network with SDP ?

  • @tammyfretz7346
    @tammyfretz7346 2 года назад

    4:57 ah yes, the Gavin Belson signature box.... With banksy signature.

  • @rasb421
    @rasb421 3 года назад

    Great explanation..

  • @pandiannaidu7989
    @pandiannaidu7989 Год назад

    can you pls tell me which tool you used for this PPT?

  • @ravianantharamaiah7567
    @ravianantharamaiah7567 4 года назад

    Very informative. Thanks for the video

  • @NobogiSomebogi
    @NobogiSomebogi 2 года назад

    If cyber security has its own institution or club, then your next goal is to have your videos and channels being recommended by the clubs and institutions?
    You might want to talk to them, see if there is any topics they would like you to talk about for their members. Make a video or two for them.

  • @midsfb
    @midsfb Год назад +1

    Great video but I had to watch at .75 speed

  • @larryogunbanjo4170
    @larryogunbanjo4170 4 года назад +2

    Wow wow wow

  • @tedahd5004
    @tedahd5004 2 года назад

    eh man you made phd possible in six minutes