05/09 (Tue.) 15:45 - 16:15
The best practices of endpoint security management for zero trust architecture
簡報連結
  • FORUM | Brand Day - HCL Software
  • LOCATION | Taipei Nangang Exhibition Center, Hall 2 7F 701G
  • LEVEL | Intermediate
  • SESSION TYPE | Onsite
  • LANGUAGE | Chinese
  • SESSION TOPIC | Zero Trust Architecture Endpoint Security Compliance

According to NIST 800-207, one of the key requirements for Zero Trust Architecture (ZTA) is the ability to identify and monitor devices, including those that are not part of the enterprise. In Zero Trust Architecture, the endpoint is your first line of defense. The line of defense. How do you identify risk, manage settings, and monitor all endpoints for Zero Trust compliance with Zero Trust Endpoint Management? You need the following two capabilities: Increase visibility into all endpoints and identify whether they belong to your organization Or owned by others, when hackers can use the vulnerability to intrude and access your data and resources, it can be quickly patched in real time. Provide complete endpoint visibility, through the zero trust concept of never trust, always verify, and cooperate with automated work Processes improve your organization's security posture, protection and compliance.