zero trust

Features of the seminar
What is microsegmentation as a ransomware countermeasure for organizations with many servers such as banks, local governments, finance, and government offices?
There is no end to ransomware damage caused by sophisticated attacks such as spoofing.
Zero Trust recognizes that threats can be infiltrated internally, and requires countermeasures based on the assumption that a breach will occur.
However, with detection-based after-the-fact countermeasures such as EDR, the damage propagates laterally until it is detected.
In order to minimize damage, it is not only necessary to ``detect'' threats, but also ``containment'' to prevent them from spreading further.
In this seminar, we will introduce the latest micro-segmentation solutions that finely restrict communication on a workload-by-workload basis and "contain" the spread of threats.
In addition to communication control between physical servers, we will also introduce new ways of security operation, such as implementing the latest micro-segmentation in distributed hybrid environments such as cloud, containers, and endpoints, and linking with existing EDR solutions. .
Schedule/Application
schedule |
time |
venue |
Application |
- |
- |
- |
- |
How to participate in the online seminar
- Please register the necessary information from "Apply here" at the top of this page.
- We will email you the login URL for the online seminar by 17:00 the day before the event. *
- On the day of the event, when it is time, please access from the login URL and listen to the lecture.
※セキュリティポリシーなどの関係で届かない可能性がございます。届いていない場合は、zerotrust@macnica.co.jpまでご連絡ください。
*Registration is required to attend. Please refrain from sharing your login URL.
Event requirements
Venue |
Held as an online seminar *You can perform a connection test in advance from the following URL. https://zoom.us/test |
---|---|
Capacity | none |
Preparation |
What to prepare on the day
|
Cost | Free (pre-registration required) |
Program
13:00~13:10 |
Threats and breaches are moving from “detection” to “containment”
|
---|---|
13:10~13:20 |
What is microsegmentation?
|
13:20~13:30 |
Introducing specific implementation examples and scenes
|
*The program is subject to change without notice. Please note. Please check this web page for the latest information.
Inquiry/Document request
In charge of Macnica Zero Trust Co., Ltd.
- TEL:045-476-2010
- E-mail:zerotrust@macnica.co.jp
Weekdays: 9:00-17:00