Vulnerability Management in the Age of Zero Trust – Join us for a Live Discussion

March 24, 2020 Jonathan Cran

In my conversations with our customers here at Kenna, I’ve noticed a shift over the last two years. It can come up in a variety of ways, perhaps they’re using a public cloud to deploy VM agents to their application infrastructure, sometimes they’re implementing containers, and evaluating container security solutions, and increasingly, they have an endpoint protection solution that provides a vulnerability assessment capability and they’re interested in how it compares to their existing solution. 

In each case, they’re interested in how it integrates with Kenna, and how they can get the data in. Even if they have coverage from a “traditional” vulnerability assessment or management solution, there’s often a desire to have overlapping (but de-duplicated) visibility – and it’s increasingly common that their architecture doesn’t make scanning from the outside easy, and they’re looking for options. 

After thinking on this, I realized it’s not just the shift to cloud that’s driving this transition – or the success of the endpoint market, it’s more fundamental. While cloud (and really, the software defined perimeter) is accelerating the transition, it’s part of a larger shift. If you step back and look, each customer is in the process of a  transition to a least-privilege-focused, application-oriented, zero trust network architecture. 

Most organizations don’t have the development resources of an Akamai, and aren’t well suited to host their own worldwide authentication service. Not every enterprise can afford to run multiple networks in parallel as Google did, gradually moving employees to the new zero-trust network. No, few organizations have the resources and time of these Internet titans, but we can still glean helpful lessons from their experience, and use those to our advantage when moving to this model. 

This Thursday – at 11 a.m. PT/2 p.m. ET – join me as we look at how successful organizations have made, or are in the middle of making this transition, and what we – as vulnerability management and proactive security professionals – can do to get ahead. We’ll discuss how you can use the zero trust initiative and increased emphasis on work from home to increase your vulnerability management capabilities, and dive into key technologies you’ll need to be familiar with as part of the transition. 

Click here to register. 

The post Vulnerability Management in the Age of Zero Trust – Join us for a Live Discussion appeared first on Kenna Security.

Previous Article
Employee Spotlight: Vodka Aperol with Vasili Panopoulos
Employee Spotlight: Vodka Aperol with Vasili Panopoulos

Thorough. Organized. Thoughtful. Supportive. Creative. Calm. Highly experienced. Inspirational. One of the ...

Next Article
An open letter from Karim Toubba, CEO of Kenna Security
An open letter from Karim Toubba, CEO of Kenna Security

We are in unprecedented times, and like all of you, Kenna Security is focused on providing our services to ...