On Demand Demo Tuesdays: Building Policies to Enforce Zero Trust
Everyone’s talking about Zero Trust, but what does it mean for Identity?
Zero trust rests on secure credentials and shutting down lateral movement via automated security. Three key elements to zero trust identity security rely on segmentation, automation, and verification. The best policies to keep your identity store secure are dynamic, adjusting to the risk level of the individual, the activity, thresholds, and other variable options.
In this on-demand webinar, Preempt Product Manager Shaul Karni demonstrates the basics of policy building within the Preempt platform to:
- Build network segmentation to specific assets, by group, function, risk, and more
- Automate policies to stop malicious lateral movement
- Construct risk-based and thresholding policies to adapt to threats
- Enable conditional access based on profiles of user behavior as well as anomalies
Preempt has many policies already designed – Shaul looks at the most commonly engaged policies across many risk-intolerant customers.
Sign up on the right to watch now.