Zero Trust Architecture (ZTA) is becoming increasingly important in a cloud-first world where the perimeter no longer exists. As a result, identities, devices, virtual networks, applications, and data must be monitored and protected with an updated set of detections and controls that account for new access patterns and new types of attacks.

Tune in to a technical demo and learn about:

  • Automating the daunting task of restricting, revoking, and restoring access
  • Leveraging Risk-Based Alerting in the automation process
  • Creating playbooks that implement Auto-Containment using various Inputs, Data Types and Actions

Who will benefit: Security Analysts, SOC Managers

Kelby Shelton
Senior Solutions Engineer, Splunk