ON-DEMAND WEBINAR

Building a Zero Trust Architecture deployment With NIST

Building a Zero Trust Architecture is a complex task, but with the new National Institute of Standards and Technology (NIST) Cybersecurity Practice Guide, you can build a plan to get there.

Join this webinar to learn the purpose and methodology of the ZTA Practice Guide released by NIST, and how how Radiant Logic can deliver a critical component of creating Zero Trust Architecture: a single source of correlated identity data.

  • August 25, 2022
  • 45 Minutes
  • On-Demand Webinar

Building a Zero Trust Architecture deployment With NIST

Building a Zero Trust Architecture is a complex task, but with the new National Institute of Standards and Technology (NIST) Cybersecurity Practice Guide, you can build a plan to get there. Radiant Logic, the platform that puts identity to work to achieve Zero Trust, can deliver a single source of correlated identity data across all existing directories and identity-related databases to create a Policy Information Point (PIP), a critical component of creating Zero Trust Architecture.

Watch this webinar to:
  • Discuss the purpose and methodology of the latest document released from NIST titled Cybersecurity Practice Guide on Zero Trust
  • Review the process of creating a Zero Trust Architecture utilizing existing infrastructure and applications
  • Understand the importance of a Policy Information Point and the critical role it plays in delivering rapid access to rich, correlated identity data required by IAM, IGA, and other identity-consuming applications to build a Zero Trust Architecture
  • Learn how Radiant Logic can deliver a single source of correlated identity data across all existing directories and identity-related databases to create a Policy Information Point (PIP), a critical component of creating a Zero Trust Architecture

Speaker

Wade Ellery

Field Chief Technical Officer, Radiant Logic

Wade has extensive experience in enterprise IT direct and channel software, and services, sales and management. He has in-depth knowledge and experience in enterprise IAM, IGA, risk and compliance and IT security challenges.

Want to see more in real-time? Sign up for a demo today

Let’s start a conversation about how an Identity Data Fabric can help you and your unique use cases.