Not registered yet?

SEPTEMBER 21 - JANUARY 31
Technology demos, analyst interviews and panel discussions

•  Security Analytics is broad, let's see its many incarnations
•  Security is a data analytics problem, let's see where we are today
•  XDR ia confusing practitioners, let's see what is real
•  What the product reality is today
HOSTED BY :
Anton Chuvakin
Richard Stiennon
Brad Laporte
Zero Trust
Demo Forum
check out
more info below
Zero Trust Demo Forum
ON DEMAND
JOIN EVENT
Explore demos from a wide range of vendors, panel discussions on various Zero Trust topics, and interviews with top industry analysts
Zero Trust By Function
+
ZT Platform:
Multiple offerings in a bundle

ZT Users:
Identity and access for users/ identities
ZT Network:
Network security solutions/segmentation

ZT Workloads:
Cloud infrastructure/apps
ZT Devices:
Mobile devices/servers/BYOD/ endpoints/IoT/OT

ZT Data:
Data security
ZT Automation:
Automation/policy engines


ZT Visibility:
Analytics and visibility
Speaker Sessions
+
ZERO TRUST ASPIRATIONS: MYTHS AND ACTUALITIES
Deena Thomchick, VP Product Axis Security
Abstract: A detailed look at the myths around deployment of a Zero Trust environment and a discussion about the fastest path to establishing true Zero Trust security around networks of all types and sizes.
Premier Vendors
+




Zero Trust Demos
+
Netskope Zero Trust Data Protection
Netskope Zero Trust Data Protection provides contextual controls that follow data and users everywhere.


Zscaler Workload Segmentation: The New Way to Achieve Microsegmentation
In this demo, we discuss how customers use Zscaler Workload Segmentation to embrace microsegmentation with identity-based auto-segmentation to simplify policy creation and ensure that workloads communicate safely with each other.


InstaSafe Demo: Complete Access Management with InstaSafe
In this demo, we take you through the security mechanisms and the architecture behind our easy to monitor Zero Trust Platform, and give you a tour of the InstaSafe Single Pane Zero Trust Management Console.


Zero Trust Access for SaaS Applications
See how Banyan Security uses Trust Based Access Control to enforce device trust and device posture policies for access to SaaS applications. Eliminate security risks without introducing new network choke points.