Zero Trust-based Remote Access for Operational Cybersecurity

Logo
Presented by

Col. Jennifer Krolikowski, Chief Information Officer, Space Systems Command

About this talk

Zero Trust Network Access (ZTNA) solutions brought simplicity, scalability and more security for IT remote access use cases. This is long overdue for industrial cybersecurity. Traditional IT security approaches such as VPNs and Jump servers as well as IT security oriented ZTNA solutions have several limitations and complexity when it comes to providing streamlined and fully secure remote access for an Operational Technology (OT) environment where policies must be enforced for OT assets at the lowest level of the network. During this webinar, U.S. Space Force and Xage Security experts will explore how a Cybersecurity Mesh-based approach combined with zero trust principles can enable secure access to OT assets at different levels without compromising security measures like opening up RDP and VNC protocols through firewalls. We will discuss how the distributed enforcement of security services on a per asset basis with least privilege access and distributed data protection services can improve resiliency across various systems.

Related topics:

More from this channel

Upcoming talks (1)
On-demand talks (10)
Subscribers (897)
Xage is the first and only zero-trust real-world security company. The Xage Fabric accelerates and simplifies the way enterprises secure, manage and transform digital operations across OT, IT, and the cloud. Xage solutions include Identity & Access Management (IAM), remote access, and dynamic data security, all powered by the Xage Fabric. The Fabric is a zero trust solution that provides an overlay mesh to protect critical infrastructure by imposing granular control over all digital interactions. The Fabric ensures that each operational element — even those with no built-in identity of their own — is assigned an identity that determines who has access to it, and what the element may access itself. The Fabric not only blocks cyberattacks, but also isolates malware, siloing it and rendering it unable to pass between systems to ensure the operation can continue functioning undisturbed.