fbpx

Watch Now


How to implement Zero Trust security for your largest unmitigated attack surface

Over the past 10+ years, Zero Trust security concepts have been adopted by large and small companies, and governments to secure their digital assets. Zero Trust establishes that all users, devices, and applications, irrespective of location, are potentially untrusted entities, and access to resources is granted based on continuous verification.

While Zero Trust has made significant progress, including being required by US Government entities, its focus and execution have been primarily at network-level controls. While these network-centric measures were effective in the past, the nature of applications has evolved drastically through their use of APIs, which now present the largest new attack surface we’ve ever faced.

Zero Trust architectures have yet to catch up to this change.

This webinar looks at a reference architecture for extending the Zero Trust security model to the realities of today’s cloud-native, API-driven application architectures. 

Watch this informative session, as we cover:

  • Why deeper security that extends into APIs is needed.
  • The key tenets and definitions of Zero Trust translated for APIs.
  • What does Zero Trust need to account for at the API level?
  • How to apply Zero Trust at the API layer. 

Speakers

Sudeep Padiyar
Sr. Director, Product Management
Traceable
Richard Bird
CSO
Traceable
Dan Gordon
Technical Evangelist
Traceable