Главная
Study mode:
on
1
Intro
2
What is Beyond Corp?
3
Enterprise IT has changed
4
User experience has changed
5
Access policy goals
6
User-and service-centric access controls
7
Chain of Trust
8
Trusted platform + granular policies
9
Core principles of Beyond Corp
10
Beyond Corp software framework
11
Securing the user: security keys
12
Establishing device trust
13
Whisper's Beyond Corp architecture
14
Beyond Corp papers
Description:
Explore Google's innovative "BeyondCorp" security framework in this 40-minute RSA Conference talk by Jennifer Lin, Director of Security at Google Cloud. Learn how Google protects billions of users globally with a "security-first" approach, implementing a "Zero Trust" model that treats all networks as untrusted. Discover how this framework enables employees to work securely from any device and location without a VPN. Gain insights into the considerations for companies adopting a similar approach, understand BeyondCorp's relevance in the cloud era, and examine how cloud technology is transforming security practices. Delve into topics such as enterprise IT changes, user experience evolution, access policy goals, user-and service-centric access controls, and the chain of trust. Explore the core principles of BeyondCorp, its software framework, and the implementation of security keys for user protection. Understand the process of establishing device trust and examine Whisper's BeyondCorp architecture. Access additional resources through BeyondCorp papers to deepen your knowledge of this cutting-edge security approach. Read more

BeyondCorp - Empowering Employees with Security for the Cloud Era

RSA Conference
Add to list
0:00 / 0:00