Search

Zero Trust architecture: Hype or reality?

During this webinar, Mieke Devos, Head of Solution Design, will talk about; the importance of a Zero Trust architecture, how to deal with an ever-expanding perimeter, various users and devices requiring access to your data, moving to the cloud and other key issues. In addition, Mieke will explain in detail how you ensure the necessary cybersecurity measures are in place.

Zero Trust demos

Our demos will show Zero Trust as moving beyond just having the right username, password, and computer. Instead, we will look at additional metrics such as what the person is actually doing and if their machine has been compromised..

  • Phishing Detection and blocking
    This demo shows someone receiving a well-formatted phishing email that took a user to a web page that looked like the real company's website. On this site, the user is asked to log in with his windows credentials. We will show that we can detect this and stop the credentials from being submitted to the false site.
  • Detecting and disconnecting a compromised client
    Not if, but when you have a compromised host, how do you deal with it? We demonstrate a compromised host trying to contact its C&C server. We will detect this on Palo Alto firewall and prevent the host from communicating through the Palo Alto firewall (this is the zone to zone protection), but this on its own is not enough as the host can still communicate to other hosts within the same routing domain. To counteract this, we show how Palo Alto Networks integrates with ClearPass. Once ClearPass gets the message from the Palo Alto firewall, the host can be disconnected from the production network and placed into an isolated quarantine network for remediation. Optionally, we can demo ClearPass OnGuard. This demo is not confined to C&C; it will also apply to virus and spyware detection.
  • Disconnecting a remote VPN client
    Very similar to the previous demo, but here we are using a Global Protect connection instead. The remediation is different because the host is just disconnected from the network.

Program

  • Digital transformation is everywhere
  • Changing the paradigm
  • What is the new perimeter?
  • Secure how someone or something is accessing assets
  • How to adopt
  • Put into practice
  • Make the Zero Trust transformation journey a success
  • Key takeaways
  • Demos

Download our Zero Trust whitepaper

Discover the three basic principles of Zero Trust:

  1. Diligently implement “Least Privilege” throughout the organization
  2. Assume a breach has happened or will happen
  3. Authenticate and authorize every transaction
Download our Whitepaper

Contact us

 Call us

Facing an emergency right now? Call our Incident Response Hotline +32 3 641 95 95.

For general questions, you can reach us from 8:30 am untill 5:30 pm via  +32 3 641 95 95.

For Support you can reach us via  +32 78 77 00 24. If you need support outside of the office hours, please use your pincode. 

 Email

You can send us an email via info@be.orangecyberdefense.com

☑ Visit us

Our headquarters is located near Antwerp. You can visit us in the Green Water Tower. 
Stokerijstraat 35,
2110 Wijnegem,
Belgium

 

 

Please fill out the form below to submit your question.

Incident Response Hotline

Facing cyber incidents right now?

Contact our 24/7/365 world wide service incident response hotline.