Búsqueda

Your path to zero trust : practical steps to achieve a continuous zero trust model

<?xml version="1.0" encoding="UTF-8" standalone="no"?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<rdf:Description>
<dc:creator>Izuakor, Christine </dc:creator>
<dc:creator>Forcepoint</dc:creator>
<dc:date>2020-11-02</dc:date>
<dc:description xml:lang="es">Sumario: Zero Trust is more than a buzz phrase. It's a new paradigm way of implementing cybersecurity that has taken on new urgency as increasingly distributed organizations deal with a growing onslaught of complicated and sophisticated threats that result in data breaches. In a business world without perimeters, finding a balance between easy collaboration and data security can be challenging. The sudden increase in remote working has added layers of complexity, with users and data operating outside of traditional IT defenses that implicitly trust people who are inside of the network. </dc:description>
<dc:identifier>https://documentacion.fundacionmapfre.org/documentacion/publico/es/bib/174543.do</dc:identifier>
<dc:language>eng</dc:language>
<dc:publisher>Forcepoint</dc:publisher>
<dc:rights xml:lang="es">InC - http://rightsstatements.org/vocab/InC/1.0/</dc:rights>
<dc:subject xml:lang="es">Seguridad de la información</dc:subject>
<dc:subject xml:lang="es">Ciberseguridad</dc:subject>
<dc:subject xml:lang="es">Protección de datos</dc:subject>
<dc:subject xml:lang="es">Seguridad informática</dc:subject>
<dc:subject xml:lang="es">Ciberataques</dc:subject>
<dc:type xml:lang="es">Libros</dc:type>
<dc:title xml:lang="es">Your path to zero trust : practical steps to achieve a continuous zero trust model</dc:title>
<dc:format xml:lang="es">19 p.</dc:format>
</rdf:Description>
</rdf:RDF>