Eitan Bremler will present the Zero-Trust Solution and how to keep employees safe
Safe-T® Group Ltd. (NASDAQ, TASE: SFET), a provider of Secure Access solutions for on-premise and hybrid cloud environments, today announced it will hold a virtual event – webinar with Fujitsu, a global information and communication technology (ICT) company, on December 10, 2020. Eitan Bremler, Co-Founder & VP Corporate Development of Safe-T, will demonstrate Zero Trust-based network access solutions (ZTNA) and how to keep employees safe. The virtual event will be featured from Portugal.
The Covid-19 pandemic has increased the number of security breaches to which organizations and workers are exposed. In recent months, employees around the world have had to adapt to telecommuting without adequate security measures.
Working remotely involves certain risks at the organizational level. It means accessing company resources remotely, which brings a noticeable increase in cyber risks because the “attack surface” increases exponentially and makes companies much more vulnerable. Each external connection becomes a potential security breach. This happens when the user’s identity is not controlled, nor is authentication requested, or if the user’s session with the internal applications is not monitored, registered and audited.
ZTNA is changing the way organizations grant external, secure, segmented and audited access to their services, significantly reducing the attack surface area, hiding system vulnerabilities and mitigating unauthorized or risky access.
In this webinar we will address the massive use of ZTNA-based services as a measure to manage access for employees, suppliers and collaborators, who need secure access to corporate resources.
Participate in the next “Keep Your Employees Safe” webinar, in which experts from Fujitsu and Safe-T will talk about Zero Trust secure access service, a security concept that goes beyond VPNs and SDN, improving connection protection, strengthening authentication and providing managed, monitored and secure access to networked systems inside and outside the company’s perimeter.