Тёмный

Why Implement Zero Trust 

IBM Technology
Подписаться 803 тыс.
Просмотров 30 тыс.
50% 1

See current threats: ibm.biz/BdP3Qh
Learn about IBM zero trust security solutions: ibm.biz/BdP3QV
Moving to a hybrid, multicloud infrastructure means your resources are also likely scattered throughout multiple IT environments with varying levels of visibility and control. It’s difficult to know if the right user has the right access to the right data. You need context to help you make the right decisions. Distinguished Engineer, Jeff Crume explains how "the bad guy" may already be in your house - as an analogy, comparing it to your business.
Download a free AI ebook: ibm.biz/Trust_Free_AI_Ebook
Get started for free on IBM Cloud: ibm.biz/Zero_Trust_Free_Cloud...
Subscribe to see more videos like this in the future → ibm.biz/subscribe-now
#AI #Software #ITModernization #ZeroTrust #lightboard #IBM

Опубликовано:

 

28 июл 2022

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 47   
@amjads8971
@amjads8971 2 года назад
IBM knows how to creating videos explaining complex topics in a very simple and precise manner
@davidkayembe5262
@davidkayembe5262 Год назад
Just incredible
@timeglass777
@timeglass777 5 месяцев назад
It is a good analogy of ZTA but its concepts are much broader. ID verification, Access control, Monitoring and Analysis are just few of the key principles.
@johnwade1325
@johnwade1325 2 года назад
This is a nice presentation. Thank you. Another way I like to put it is this, "The role of security is to let the right people in, not to keep the wrong people out". Looked at it this way, zero trust doesn't look so draconian. This doesn't sit well with the house analogy, but does with real commercial computer systems (sadly, there have been cases throughout the history of IT where systems have been abused from the inside as well as from the outside). The point about granting people only the rights they need is well made - though you do need facilities and procedures to give temporary access when a critical worker on a system is suddenly unavailable: someone has to have the authority to grant temporary access - and then take it away as soon as the usual person returns. The point about "risk assessment" is also well made. You want everyone to come to your website and browse freely if you are selling something - but you want a solid guarantee of identity if they have a purchasing account with you: so different parts of your application may well have very different levels of security from total trust to zero trust, Granularity is key, and must be designed into the application from the outset. Good Code is Not Enough!
@jeffcrume
@jeffcrume Год назад
Well said, John!
@louiseabigailpayuyo5120
@louiseabigailpayuyo5120 Год назад
Excellent explanation! Very easy to understand. Thanks and hope you produce more of this type of content.
@erikslorenz
@erikslorenz 2 года назад
These vids rock. Whoever came up with the idea is the man
@oladimejimichaeloloyede7203
@oladimejimichaeloloyede7203 2 года назад
I like the build-up scenario of the house security, is like holding a baby's hand from level 0 to a higher level of talking about the least privilege. Thank you.
@surenderarora1899
@surenderarora1899 Год назад
Great analogy of House to simplify the understanding - How to secure IT infra at Zero Trust Level. Nicely Explained - Never Trust Always Verify. Thanks a lot Jeff!
@jeffcrume
@jeffcrume Год назад
Thanks for taking the time to provide encouraging feedback! I’m glad you enjoyed it!
@macshort2645
@macshort2645 2 года назад
Jeff this was a great presentation !!!
@mirochnik2008
@mirochnik2008 2 года назад
Impressive overview of complicated subject made simple by best of the best - @Jeff Crume!
@jeffcrume
@jeffcrume Год назад
Very nice of you to say so!
@alexpishvanov736
@alexpishvanov736 2 года назад
Clear and genius explanation! As usual :)
@toenytv7946
@toenytv7946 2 года назад
Well explained. Good comparisons.
@steveandreassend8620
@steveandreassend8620 Год назад
This is excellent!
@gabicolaco3101
@gabicolaco3101 2 года назад
It was very good, thanks for the explanation!
@dadoll1660
@dadoll1660 2 года назад
Great analogy.
@theyield2521
@theyield2521 Год назад
Brilliant stuff.
@robpickles3736
@robpickles3736 5 месяцев назад
Awesome presentation! Thank you for sharing the knowledge.
@jeffcrume
@jeffcrume 5 месяцев назад
Very kind of you to say!
@alexxUKR
@alexxUKR 2 года назад
Very short, but nicely packaged overview of zero trust concept. Thank you,
@user-ty2yl4wp9z
@user-ty2yl4wp9z 7 месяцев назад
Thank you for the great information
@jeffcrume
@jeffcrume 5 месяцев назад
Thank you for saying so!
@jay2004r
@jay2004r 9 месяцев назад
This was a great explanation and great video!!
@jeffcrume
@jeffcrume 5 месяцев назад
Thanks for watching!
@tzlwin
@tzlwin 9 месяцев назад
Very informative and useful, thank you.
@jeffcrume
@jeffcrume 5 месяцев назад
Glad you liked it!
@micheldupont636
@micheldupont636 Год назад
I think it lacks the explanation of “why zero trust is essential when you are using the public cloud ?” Many companies are still thinking of perimetrical security because they are used of the “on premise” world. In the public cloud, the attacks can arrive from any place, any component…
@karengomez3143
@karengomez3143 Год назад
“The things that I trust the most are the things that I have verified the most” Depending on risks, we are setting our point in the implicit-zero tolerance spectrum… how much we’re willing to risk and our risk tolerance.
@davidkayembe5262
@davidkayembe5262 Год назад
I give you ⭐⭐⭐⭐⭐
@davidearthos6453
@davidearthos6453 Год назад
only things i can verify.. do i trust .. start from zero and rebuild..
@rickharold7884
@rickharold7884 2 года назад
Fun
@rajaganji7982
@rajaganji7982 2 года назад
What does DMZ mean?
@dadoll1660
@dadoll1660 2 года назад
demilitarized zone
@brooklyndreadlocks8182
@brooklyndreadlocks8182 Год назад
What kind of board is that? I want one.
@IBMTechnology
@IBMTechnology Год назад
Search on "lightboard videos"
@jeffcrume
@jeffcrume Год назад
ru-vid.com/video/%D0%B2%D0%B8%D0%B4%D0%B5%D0%BE-LdnJoT5IWPM.html
@amjads8971
@amjads8971 2 года назад
Distinguish engineer,what is this role. This topic is related to security engineer isn’t it ?
@IBMTechnology
@IBMTechnology Год назад
Distinguish Engineer is an IBM title that recognizes technical achievement over a long period; it involves a formal nominations by peers and executives.
@RickLambert963
@RickLambert963 Год назад
How very 1984
@TantalG
@TantalG 2 года назад
I don't trust this man.
@jeffcrume
@jeffcrume Год назад
Zero trust in action! 😂
@xelerated
@xelerated 13 дней назад
Well considering he is from IBM, not trusting him is a good thing
@michaelsloushch3950
@michaelsloushch3950 2 года назад
said nothing
@sergiomartinez5946
@sergiomartinez5946 Месяц назад
Lol saying pay per view in 2024.
Далее
Understanding Hackers
10:41
Просмотров 30 тыс.
Cybersecurity and Zero Trust
17:59
Просмотров 80 тыс.
It seems Sonya's choice was obvious! 😅 #cat #cats
00:20
What are AI Agents?
12:29
Просмотров 77 тыс.
Zero Trust Explained | Real World Example
21:46
Просмотров 19 тыс.
Tech Talk: What is Public Key Infrastructure (PKI)?
9:22
XDR (Extended Detection & Response) Explained
6:18
Просмотров 47 тыс.
How To Price For B2B | Startup School
17:46
Просмотров 19 тыс.
What is Phishing
7:54
Просмотров 36 тыс.
Soda Data Contracts Explained in 6 Minutes
5:57
Просмотров 1,2 тыс.