Why Implement Zero Trust

Поділитися
Вставка
  • Опубліковано 28 лип 2022
  • See current threats: ibm.biz/BdP3Qh
    Learn about IBM zero trust security solutions: ibm.biz/BdP3QV
    Moving to a hybrid, multicloud infrastructure means your resources are also likely scattered throughout multiple IT environments with varying levels of visibility and control. It’s difficult to know if the right user has the right access to the right data. You need context to help you make the right decisions. Distinguished Engineer, Jeff Crume explains how "the bad guy" may already be in your house - as an analogy, comparing it to your business.
    Download a free AI ebook: ibm.biz/Trust_Free_AI_Ebook
    Get started for free on IBM Cloud: ibm.biz/Zero_Trust_Free_Cloud...
    Subscribe to see more videos like this in the future → ibm.biz/subscribe-now
    #AI #Software #ITModernization #ZeroTrust #lightboard #IBM

КОМЕНТАРІ • 47

  • @amjads8971
    @amjads8971 2 роки тому +30

    IBM knows how to creating videos explaining complex topics in a very simple and precise manner

    • @davidkayembe5262
      @davidkayembe5262 Рік тому +1

      Just incredible

    • @timeglass777
      @timeglass777 5 місяців тому

      It is a good analogy of ZTA but its concepts are much broader. ID verification, Access control, Monitoring and Analysis are just few of the key principles.

  • @louiseabigailpayuyo5120
    @louiseabigailpayuyo5120 Рік тому +5

    Excellent explanation! Very easy to understand. Thanks and hope you produce more of this type of content.

  • @erikslorenz
    @erikslorenz Рік тому +1

    These vids rock. Whoever came up with the idea is the man

  • @surenderarora1899
    @surenderarora1899 Рік тому +1

    Great analogy of House to simplify the understanding - How to secure IT infra at Zero Trust Level. Nicely Explained - Never Trust Always Verify. Thanks a lot Jeff!

    • @jeffcrume
      @jeffcrume Рік тому

      Thanks for taking the time to provide encouraging feedback! I’m glad you enjoyed it!

  • @mirochnik2008
    @mirochnik2008 2 роки тому +4

    Impressive overview of complicated subject made simple by best of the best - @Jeff Crume!

    • @jeffcrume
      @jeffcrume Рік тому +1

      Very nice of you to say so!

  • @alexpishvanov736
    @alexpishvanov736 2 роки тому +4

    Clear and genius explanation! As usual :)

  • @macshort2645
    @macshort2645 2 роки тому +4

    Jeff this was a great presentation !!!

  • @toenytv7946
    @toenytv7946 2 роки тому +3

    Well explained. Good comparisons.

  • @johnwade1325
    @johnwade1325 2 роки тому +8

    This is a nice presentation. Thank you.
    Another way I like to put it is this, "The role of security is to let the right people in, not to keep the wrong people out". Looked at it this way, zero trust doesn't look so draconian. This doesn't sit well with the house analogy, but does with real commercial computer systems (sadly, there have been cases throughout the history of IT where systems have been abused from the inside as well as from the outside).
    The point about granting people only the rights they need is well made - though you do need facilities and procedures to give temporary access when a critical worker on a system is suddenly unavailable: someone has to have the authority to grant temporary access - and then take it away as soon as the usual person returns.
    The point about "risk assessment" is also well made. You want everyone to come to your website and browse freely if you are selling something - but you want a solid guarantee of identity if they have a purchasing account with you: so different parts of your application may well have very different levels of security from total trust to zero trust, Granularity is key, and must be designed into the application from the outset. Good Code is Not Enough!

  • @gabicolaco3101
    @gabicolaco3101 2 роки тому +1

    It was very good, thanks for the explanation!

  • @steveandreassend8620
    @steveandreassend8620 Рік тому +2

    This is excellent!

  • @dadoll1660
    @dadoll1660 2 роки тому +3

    Great analogy.

  • @robpickles3736
    @robpickles3736 5 місяців тому

    Awesome presentation! Thank you for sharing the knowledge.

    • @jeffcrume
      @jeffcrume 4 місяці тому

      Very kind of you to say!

  • @theyield2521
    @theyield2521 Рік тому +1

    Brilliant stuff.

  • @jay2004r
    @jay2004r 9 місяців тому

    This was a great explanation and great video!!

    • @jeffcrume
      @jeffcrume 4 місяці тому

      Thanks for watching!

  • @tzlwin
    @tzlwin 9 місяців тому

    Very informative and useful, thank you.

    • @jeffcrume
      @jeffcrume 4 місяці тому

      Glad you liked it!

  • @oladimejimichaeloloyede7203
    @oladimejimichaeloloyede7203 2 роки тому +1

    I like the build-up scenario of the house security, is like holding a baby's hand from level 0 to a higher level of talking about the least privilege. Thank you.

  • @user-ty2yl4wp9z
    @user-ty2yl4wp9z 6 місяців тому

    Thank you for the great information

    • @jeffcrume
      @jeffcrume 4 місяці тому

      Thank you for saying so!

  • @alexxUKR
    @alexxUKR 2 роки тому +3

    Very short, but nicely packaged overview of zero trust concept. Thank you,

  • @micheldupont636
    @micheldupont636 Рік тому +1

    I think it lacks the explanation of “why zero trust is essential when you are using the public cloud ?”
    Many companies are still thinking of perimetrical security because they are used of the “on premise” world. In the public cloud, the attacks can arrive from any place, any component…

  • @karengomez3143
    @karengomez3143 Рік тому

    “The things that I trust the most are the things that I have verified the most”
    Depending on risks, we are setting our point in the implicit-zero tolerance spectrum… how much we’re willing to risk and our risk tolerance.

  • @davidkayembe5262
    @davidkayembe5262 Рік тому +1

    I give you ⭐⭐⭐⭐⭐

  • @brooklyndreadlocks8182
    @brooklyndreadlocks8182 Рік тому +1

    What kind of board is that? I want one.

    • @IBMTechnology
      @IBMTechnology  Рік тому

      Search on "lightboard videos"

    • @jeffcrume
      @jeffcrume Рік тому

      ua-cam.com/video/LdnJoT5IWPM/v-deo.html

  • @rajaganji7982
    @rajaganji7982 2 роки тому

    What does DMZ mean?

  • @davidearthos6453
    @davidearthos6453 Рік тому +1

    only things i can verify.. do i trust .. start from zero and rebuild..

  • @amjads8971
    @amjads8971 2 роки тому

    Distinguish engineer,what is this role. This topic is related to security engineer isn’t it ?

    • @IBMTechnology
      @IBMTechnology  Рік тому +1

      Distinguish Engineer is an IBM title that recognizes technical achievement over a long period; it involves a formal nominations by peers and executives.

  • @rickharold7884
    @rickharold7884 2 роки тому

    Fun

  • @RickLambert963
    @RickLambert963 Рік тому

    How very 1984

  • @michaelsloushch3950
    @michaelsloushch3950 2 роки тому +1

    said nothing

  • @TantalG
    @TantalG 2 роки тому +5

    I don't trust this man.

    • @jeffcrume
      @jeffcrume Рік тому +1

      Zero trust in action! 😂

    • @xelerated
      @xelerated 8 днів тому

      Well considering he is from IBM, not trusting him is a good thing

  • @sergiomartinez5946
    @sergiomartinez5946 Місяць тому

    Lol saying pay per view in 2024.