Skip navigation

Past the Perimeter: Earned Access Through A Zero-Trust Model

In this webinar, you will learn:

  • Why the traditional perimeter-focused security model won’t meet the needs of most modern organizations
  • How a zero-trust security model can overcome these challenges
  • How you can incorporate this approach into your existing architecture without starting from scratch

Users whose digital lives are increasingly mobile don’t want to be tied to their desks, and an effective security strategy must be flexible enough to protect access from boardrooms and bars, cubicles and coffee shops alike. To do this, companies must ensure that users and their devices meet the same security controls, whether they’re outside or inside the network perimeter.

Duo adopted the “zero-trust network” model to solve this challenge. All networks and devices are treated as untrusted until proven otherwise, and their health is checked each time a user connects to a protected resource. This approach depends on visibility into whether basic device and network security standards are met. It also requires the ability to enforce granular policy controls based on the results of that health check.

The perimeter is disappearing, and it’s not coming back… find out how you can get a head start on what’s next.

Presenter Info
Sean Frazier, Advisory CISO

Sean Frazier has spent 25 years in technology; spending most of those years working in cyber security in the public sector with companies like Netscape, Loudcloud/Opsware, Bluebox and Mobileiron.

Zoe Lindsey, Advocacy Manager

Zoe Lindsey is Duo’s Advocacy Manager, where she educates and advises organizations with unique compliance challenges including the healthcare, government, and financial industries on strong security policy and Trusted Access solutions. She has been hooked on tech since getting her first Commodore 64 at age 10, and joined Duo with a background in cellular and medical technology.