Why Implement Zero Trust

แชร์
ฝัง
  • เผยแพร่เมื่อ 20 ส.ค. 2024
  • See current threats: ibm.biz/BdP3Qh
    Learn about IBM zero trust security solutions: ibm.biz/BdP3QV
    Moving to a hybrid, multicloud infrastructure means your resources are also likely scattered throughout multiple IT environments with varying levels of visibility and control. It’s difficult to know if the right user has the right access to the right data. You need context to help you make the right decisions. Distinguished Engineer, Jeff Crume explains how "the bad guy" may already be in your house - as an analogy, comparing it to your business.
    Download a free AI ebook: ibm.biz/Trust_...
    Get started for free on IBM Cloud: ibm.biz/Zero_T...
    Subscribe to see more videos like this in the future → ibm.biz/subscri...
    #AI #Software #ITModernization #ZeroTrust #lightboard #IBM

ความคิดเห็น • 47

  • @amjads8971
    @amjads8971 2 ปีที่แล้ว +30

    IBM knows how to creating videos explaining complex topics in a very simple and precise manner

    • @davidkayembe5262
      @davidkayembe5262 ปีที่แล้ว +1

      Just incredible

    • @timeglass777
      @timeglass777 6 หลายเดือนก่อน

      It is a good analogy of ZTA but its concepts are much broader. ID verification, Access control, Monitoring and Analysis are just few of the key principles.

  • @surenderarora1899
    @surenderarora1899 ปีที่แล้ว +1

    Great analogy of House to simplify the understanding - How to secure IT infra at Zero Trust Level. Nicely Explained - Never Trust Always Verify. Thanks a lot Jeff!

    • @jeffcrume
      @jeffcrume ปีที่แล้ว

      Thanks for taking the time to provide encouraging feedback! I’m glad you enjoyed it!

  • @louiseabigailpayuyo5120
    @louiseabigailpayuyo5120 2 ปีที่แล้ว +5

    Excellent explanation! Very easy to understand. Thanks and hope you produce more of this type of content.

  • @johnwade1325
    @johnwade1325 2 ปีที่แล้ว +8

    This is a nice presentation. Thank you.
    Another way I like to put it is this, "The role of security is to let the right people in, not to keep the wrong people out". Looked at it this way, zero trust doesn't look so draconian. This doesn't sit well with the house analogy, but does with real commercial computer systems (sadly, there have been cases throughout the history of IT where systems have been abused from the inside as well as from the outside).
    The point about granting people only the rights they need is well made - though you do need facilities and procedures to give temporary access when a critical worker on a system is suddenly unavailable: someone has to have the authority to grant temporary access - and then take it away as soon as the usual person returns.
    The point about "risk assessment" is also well made. You want everyone to come to your website and browse freely if you are selling something - but you want a solid guarantee of identity if they have a purchasing account with you: so different parts of your application may well have very different levels of security from total trust to zero trust, Granularity is key, and must be designed into the application from the outset. Good Code is Not Enough!

    • @jeffcrume
      @jeffcrume ปีที่แล้ว

      Well said, John!

  • @erikslorenz
    @erikslorenz 2 ปีที่แล้ว +1

    These vids rock. Whoever came up with the idea is the man

  • @oladimejimichaeloloyede7203
    @oladimejimichaeloloyede7203 2 ปีที่แล้ว +1

    I like the build-up scenario of the house security, is like holding a baby's hand from level 0 to a higher level of talking about the least privilege. Thank you.

  • @mirochnik2008
    @mirochnik2008 2 ปีที่แล้ว +4

    Impressive overview of complicated subject made simple by best of the best - @Jeff Crume!

    • @jeffcrume
      @jeffcrume ปีที่แล้ว +1

      Very nice of you to say so!

  • @macshort2645
    @macshort2645 2 ปีที่แล้ว +4

    Jeff this was a great presentation !!!

  • @alexpishvanov736
    @alexpishvanov736 2 ปีที่แล้ว +4

    Clear and genius explanation! As usual :)

  • @steveandreassend8620
    @steveandreassend8620 ปีที่แล้ว +2

    This is excellent!

  • @robpickles3736
    @robpickles3736 6 หลายเดือนก่อน

    Awesome presentation! Thank you for sharing the knowledge.

    • @jeffcrume
      @jeffcrume 5 หลายเดือนก่อน

      Very kind of you to say!

  • @dadoll1660
    @dadoll1660 2 ปีที่แล้ว +3

    Great analogy.

  • @toenytv7946
    @toenytv7946 2 ปีที่แล้ว +3

    Well explained. Good comparisons.

  • @jay2004r
    @jay2004r 10 หลายเดือนก่อน

    This was a great explanation and great video!!

    • @jeffcrume
      @jeffcrume 5 หลายเดือนก่อน

      Thanks for watching!

  • @theyield2521
    @theyield2521 ปีที่แล้ว +1

    Brilliant stuff.

  • @alexxUKR
    @alexxUKR 2 ปีที่แล้ว +3

    Very short, but nicely packaged overview of zero trust concept. Thank you,

  • @tzlwin
    @tzlwin 10 หลายเดือนก่อน

    Very informative and useful, thank you.

    • @jeffcrume
      @jeffcrume 5 หลายเดือนก่อน

      Glad you liked it!

  • @gabicolaco3101
    @gabicolaco3101 2 ปีที่แล้ว +1

    It was very good, thanks for the explanation!

  • @karengomez3143
    @karengomez3143 ปีที่แล้ว

    “The things that I trust the most are the things that I have verified the most”
    Depending on risks, we are setting our point in the implicit-zero tolerance spectrum… how much we’re willing to risk and our risk tolerance.

  • @user-ty2yl4wp9z
    @user-ty2yl4wp9z 7 หลายเดือนก่อน

    Thank you for the great information

    • @jeffcrume
      @jeffcrume 5 หลายเดือนก่อน

      Thank you for saying so!

  • @micheldupont636
    @micheldupont636 ปีที่แล้ว +1

    I think it lacks the explanation of “why zero trust is essential when you are using the public cloud ?”
    Many companies are still thinking of perimetrical security because they are used of the “on premise” world. In the public cloud, the attacks can arrive from any place, any component…

  • @davidearthos6453
    @davidearthos6453 ปีที่แล้ว +1

    only things i can verify.. do i trust .. start from zero and rebuild..

  • @davidkayembe5262
    @davidkayembe5262 ปีที่แล้ว +1

    I give you ⭐⭐⭐⭐⭐

  • @brooklyndreadlocks8182
    @brooklyndreadlocks8182 ปีที่แล้ว +1

    What kind of board is that? I want one.

    • @IBMTechnology
      @IBMTechnology  ปีที่แล้ว

      Search on "lightboard videos"

    • @jeffcrume
      @jeffcrume ปีที่แล้ว

      th-cam.com/video/LdnJoT5IWPM/w-d-xo.html

  • @amjads8971
    @amjads8971 2 ปีที่แล้ว

    Distinguish engineer,what is this role. This topic is related to security engineer isn’t it ?

    • @IBMTechnology
      @IBMTechnology  ปีที่แล้ว +1

      Distinguish Engineer is an IBM title that recognizes technical achievement over a long period; it involves a formal nominations by peers and executives.

  • @rajaganji7982
    @rajaganji7982 2 ปีที่แล้ว

    What does DMZ mean?

    • @dadoll1660
      @dadoll1660 2 ปีที่แล้ว +3

      demilitarized zone

  • @rickharold7884
    @rickharold7884 2 ปีที่แล้ว

    Fun

  • @RickLambert963
    @RickLambert963 ปีที่แล้ว

    How very 1984

  • @TantalG
    @TantalG 2 ปีที่แล้ว +5

    I don't trust this man.

    • @jeffcrume
      @jeffcrume ปีที่แล้ว +1

      Zero trust in action! 😂

    • @xelerated
      @xelerated หลายเดือนก่อน

      Well considering he is from IBM, not trusting him is a good thing

  • @michaelsloushch3950
    @michaelsloushch3950 2 ปีที่แล้ว +1

    said nothing

  • @sergiomartinez5946
    @sergiomartinez5946 2 หลายเดือนก่อน

    Lol saying pay per view in 2024.