Site Search

zero trust

Modern microsegmentation implementation techniques

Features of the seminar

What is microsegmentation as a ransomware countermeasure for organizations with many servers such as banks, local governments, finance, and government offices?

There is no end to ransomware damage caused by sophisticated attacks such as spoofing.
Zero Trust recognizes that threats can be infiltrated internally, and requires countermeasures based on the assumption that a breach will occur.
However, with detection-based after-the-fact countermeasures such as EDR, the damage propagates laterally until it is detected.
In order to minimize damage, it is not only necessary to ``detect'' threats, but also ``containment'' to prevent them from spreading further.

In this seminar, we will introduce the latest micro-segmentation solutions that finely restrict communication on a workload-by-workload basis and "contain" the spread of threats.

In addition to communication control between physical servers, we will also introduce new ways of security operation, such as implementing the latest micro-segmentation in distributed hybrid environments such as cloud, containers, and endpoints, and linking with existing EDR solutions. .

Schedule/Application

schedule

time

venue

Application

How to participate in the online seminar

  • Please register the necessary information from "Apply here" at the top of this page.
  • We will email you the login URL for the online seminar by 17:00 the day before the event. *
  • On the day of the event, when it is time, please access from the login URL and listen to the lecture.

※セキュリティポリシーなどの関係で届かない可能性がございます。届いていない場合は、zerotrust@macnica.co.jpまでご連絡ください。

*Registration is required to attend. Please refrain from sharing your login URL.

Event requirements

Venue

Held as an online seminar

*You can perform a connection test in advance from the following URL.

https://zoom.us/test
Capacity none
Preparation
What to prepare on the day
  • PC to attend the online seminar
  • Environment for Internet connection
Cost Free (pre-registration required)

Program

13:00~13:10
Threats and breaches are moving from “detection” to “containment”
13:10~13:20
What is microsegmentation?
13:20~13:30
Introducing specific implementation examples and scenes

*The program is subject to change without notice. Please note. Please check this web page for the latest information.

Inquiry/Document request

In charge of Macnica Zero Trust Co., Ltd.

Weekdays: 9:00-17:00