Building a Zero Trust Architecture deployment With NIST
Building a Zero Trust Architecture is a complex task, but with the new National Institute of Standards and Technology (NIST) Cybersecurity Practice Guide, you can build a plan to get there.
Join this webinar to learn the purpose and methodology of the ZTA Practice Guide released by NIST, and how how Radiant Logic can deliver a critical component of creating Zero Trust Architecture: a single source of correlated identity data.
Building a Zero Trust Architecture deployment With NIST
Building a Zero Trust Architecture is a complex task, but with the new National Institute of Standards and Technology (NIST) Cybersecurity Practice Guide, you can build a plan to get there. Radiant Logic, the platform that puts identity to work to achieve Zero Trust, can deliver a single source of correlated identity data across all existing directories and identity-related databases to create a Policy Information Point (PIP), a critical component of creating Zero Trust Architecture.
- Discuss the purpose and methodology of the latest document released from NIST titled Cybersecurity Practice Guide on Zero Trust
- Review the process of creating a Zero Trust Architecture utilizing existing infrastructure and applications
- Understand the importance of a Policy Information Point and the critical role it plays in delivering rapid access to rich, correlated identity data required by IAM, IGA, and other identity-consuming applications to build a Zero Trust Architecture
- Learn how Radiant Logic can deliver a single source of correlated identity data across all existing directories and identity-related databases to create a Policy Information Point (PIP), a critical component of creating a Zero Trust Architecture
Speaker
Wade Ellery
Field Chief Technical Officer, Radiant LogicWade has extensive experience in enterprise IT direct and channel software, and services, sales and management. He has in-depth knowledge and experience in enterprise IAM, IGA, risk and compliance and IT security challenges.
Want to see more in real-time? Sign up for a demo today
Let’s start a conversation about how an Identity Data Fabric can help you and your unique use cases.