Your path to zero trust : practical steps to achieve a continuous zero trust model
Contenido multimedia no disponible por derechos de autor o por acceso restringido. Contacte con la institución para más información.
Tag | 1 | 2 | Valor |
---|---|---|---|
LDR | 00000nam a22000004b 4500 | ||
001 | MAP20210004087 | ||
003 | MAP | ||
005 | 20210208133646.0 | ||
008 | 160505e20201102usa|||| ||| ||eng d | ||
040 | $aMAP$bspa | ||
084 | $a86 | ||
100 | 1 | $0MAPA20210002205$aIzuakor, Christine | |
245 | 1 | 0 | $aYour path to zero trust$b : practical steps to achieve a continuous zero trust model$cChristine Izuakor |
260 | $aAustin, TX$bForcepoint$c2020 | ||
300 | $a19 p. | ||
520 | $aZero Trust is more than a buzz phrase. It's a new paradigm way of implementing cybersecurity that has taken on new urgency as increasingly distributed organizations deal with a growing onslaught of complicated and sophisticated threats that result in data breaches. In a business world without perimeters, finding a balance between easy collaboration and data security can be challenging. The sudden increase in remote working has added layers of complexity, with users and data operating outside of traditional IT defenses that implicitly trust people who are inside of the network. | ||
650 | 4 | $0MAPA20080622251$aSeguridad de la información | |
650 | 4 | $0MAPA20140022700$aCiberseguridad | |
650 | 4 | $0MAPA20080592875$aProtección de datos | |
650 | 4 | $0MAPA20080603731$aSeguridad informática | |
650 | 4 | $0MAPA20140023066$aCiberataques | |
710 | 2 | $0MAPA20210002212$aForcepoint |