Skip to content
Explore All

Securing Users' Access to Applications Using ZTNA


Course
Upgrade subscription below

Control application and database access when identity is the new perimeter. Explore how ZTNA enhances access policies, reporting, and threat detection. Gain insights into its use cases and its role within a connected cybersecurity strategy. Presented by Linette Mananghaya, Senior Security Solutions Engineer, Sophos.

Most organizations are grappling with controlling access to the applications and database when identity becomes the new perimeter. Most practitioners have been experimenting with ZTNA, a zero-trust network access framework for cloud access and remote management of user applications.

The session will cover:

  • How ZTNA helps manage user access policies, reporting of incidents and threat detection
  • Use case scenarios around how ZTNA will build availability and confidentiality
  • Why it is essential to consider ZTNA within the context of a connected cybersecurity strategy, which is provided through Adaptive Cybersecurity Ecosystem (ACE)

Here is the course outline:

Securing Users' Access to Applications Using ZTNA