Тёмный

Zero Trust Explained in 4 mins 

IBM Technology
Подписаться 788 тыс.
Просмотров 142 тыс.
50% 1

Learn about current threats: ibm.biz/BdP3Qm
Learn about IBM zero trust security solutions: ibm.biz/BdP3QK
A zero trust approach aims to wrap security around every user, every device, every connection - every time. Unify and integrate your security tools to protect your most valuable assets and proactively manage threats.
See how to modernize security as you migrate to the cloud → ibm.biz/Bdf8Hb
Explore the tools and processes that will help you preserve privacy within your organization → ibm.biz/Bdf8Hp
Learn how to prepare for ransomware attacks and address insider threats → ibm.biz/Bdf8H8
See what it takes to secure your remote and hybrid workforce → ibm.biz/Bdf8Hg
Subscribe to see more videos like this in the future → ibm.biz/subscribe-now
#ZeroTrust #CloudSecurity #IBMSecurity

Наука

Опубликовано:

 

7 июл 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 28   
@markusbuchholz3518
@markusbuchholz3518 2 года назад
I really appreciate how IBM promotes the knowledge across the world. YT channel is brilliant and content always very consistent and informative. I do believe that IBMs performance has an outstanding positive social impact, which affects on increase of technology awareness among people. More knowledge and understanding of modern IT infrastructure make our life easier and safer. Generally, the knowledge affects people take decisions more wisely. From my humble point of view IBM fulfill that concept remarkably. It is a pleasure to be here. Keep fingers for your goals.
@IBMTechnology
@IBMTechnology 2 года назад
Thank you for the lovely feedback, Markus! It makes us really happy to hear this! 🙏
@CyberTronics
@CyberTronics 2 года назад
Really appreciate the clarity and brevity provided in this video. Clicked well
@toenytv7946
@toenytv7946 2 года назад
Great job. IBM hold those principals close to the heart. Go IBM Security thanks for the video.
@erikslorenz
@erikslorenz 2 года назад
This channel is great in terms of explaining things
@NK-iw6rq
@NK-iw6rq Год назад
That was very informative, thanks IBM!
@biohackingalchemy7996
@biohackingalchemy7996 Год назад
You might like to know, the idea of Zero trust originated in the OSSTMM, and was created WAYYYY before "zero trust" was coined. might want to look into the original.
@frabsurdity
@frabsurdity Месяц назад
1. Verify explicitly 2. Provide least privilege necessary to get job done 3. Assume breach at every step
@jonwill
@jonwill 2 года назад
Very well presented; thank you for sharing
@amilasamaraweera6209
@amilasamaraweera6209 3 месяца назад
Good explanation!
@Lunnyfish
@Lunnyfish 2 года назад
very clear
@darius202419
@darius202419 2 года назад
Well said... now this is a good trust practice....it irks some of us when the latest buzzword drives every vendor to run around town only parroting the said buzzword
@MyChannel706
@MyChannel706 2 года назад
Excellent!
@tariqkhan185
@tariqkhan185 Год назад
I knew there was something off about Helen.
@anothersonnyday936
@anothersonnyday936 Год назад
I think what would make this video more useful is explaining what was “before” zero trust. No one trusted Helen before, so what’s new? Everything explained here is something that was practiced since computers were invented for the most part. Informative for those who aren’t familiar with security best practices, not so much for those who want to know if this is actually something new or another buzz word.
@omaralaadin3927
@omaralaadin3927 2 года назад
Wow great, I know a story BTW which Zero-Trust could've helped. A famous core-banking-systems company where the Qa member asks the IT member "They're friends" to give them credentials for a production payment System to do " QA "... Soon later "after several months" a Bank customer comes in and complains about 50k disappeared suddenly from his account... And turned out to be: it was the QA member :).. And it wasn't that customer alone
@seanlu1254
@seanlu1254 2 месяца назад
Ought to assume the QA may breach the system to do bad things - rule 3
@MrTolcher
@MrTolcher Год назад
I never trusted Helen
@eke313
@eke313 Год назад
🤣
@mokeeiswatching
@mokeeiswatching 8 месяцев назад
No, not Helan😟
@glennedgar5057
@glennedgar5057 2 года назад
Would be nice to talk about service meshes, both the data plane and the control plane. Service meshes claim to promote zero trust networks as all access have to come through a sidecar app. The service mesh product consol claims to have the ability to link data centers. I believe this would be of great value to some one like IBM Cloud. Majority of companies will have their sites on amazon or microsoft. Service meshes have the ability for ibm to snag customers, particular customers who could use mainframe type operations. My son and daughter started a high tech health company. They were chosen to a incibatory project. As a result they were given cloud credits on google, amazon and microsoft. The engineers want microsoft, marketing wants amazon. Seems service meshes are a great way for startups to start out with.
@Douglas_Gillette
@Douglas_Gillette 4 месяца назад
Most security products and strategies are not new or advanced. This includes the ‘Zero Trust’ strategy, regardless of how frequently vendors mention it. Authentication being used behind the firewall and on the internal devices of a network has been used for decades.
@alexandresantosal
@alexandresantosal Год назад
Show de bola
@Zero_trustZoneAPI
@Zero_trustZoneAPI 12 дней назад
🌟🌟🌟
@user-fr6mn6qv1h
@user-fr6mn6qv1h Год назад
@rbmaserang
@rbmaserang Год назад
Devastated decades ago.. it's revealing to witness this ethos. But that explains IBM ghost ship presence in society.
@Retroman8077
@Retroman8077 5 месяцев назад
For us true geeks it's a strategy that proved unreliable. It doesn't take a off point Snowden film to prove it either. If your staff can't learn enough to cancel Helens access on the way out the door your company is fffffed from the first time booz sends you a employee making 285k a year
@RickLambert963
@RickLambert963 Год назад
How very 1984
Далее
Zero Trust Explained | Real World Example
21:46
Просмотров 17 тыс.
Cybersecurity and Zero Trust
17:59
Просмотров 79 тыс.
Lasagna Soup @Lionfield
00:35
Просмотров 7 млн
skibidi toilet 76 (part 1)
03:10
Просмотров 12 млн
2024 Cybersecurity Trends
7:57
Просмотров 157 тыс.
Understanding and Getting Started with ZERO TRUST
57:11
Containers vs VMs: What's the difference?
8:08
Просмотров 745 тыс.
Zero Trust Security
21:05
Просмотров 32 тыс.
Cybersecurity Architecture: Application Security
16:36
Сложная распаковка iPhone 15
1:01
Просмотров 14 тыс.