How to Build Zero Trust Security with an Identity Centric, Software Defined Perimeter

North America - Oct 29 - 11am MST | EMEA - Oct 29 - 2pm BST

What You'll Learn

External and internal threats are always on the network. This Zero Trust assumption, along with cloud migration and remote access have made perimeter based tools like firewalls and VPNs increasingly less relevant. A continued focus on these outdated controls has led to significant data breaches across industries and geographies.

Join Cyxtera and Ping Identity as they discuss the vulnerabilities presented by today’s “connect first, authenticate second” approach and how to improve upon this with an identity centric, software defined perimeter. Webinar attendees will learn about:
  • Addressing cloud migration and remote access with Zero Trust principles
  • The identity and network security requirements to enable Zero Trust
  • How to leverage user and device risk to create micro-segmented networks


Baber Amin

Field CTO - Ping Identity

Jason Garbis

VP, Products - Cyxtera Technologies

Save Your Spot

Your spot is now reserved!

An email with all the webinar details has been sent to your email address. We look forward to seeing you there. Interested in learning more? Visit our webinar archive.