Question & Answer
Question
This pair of videos inspire you to reimagine your hybrid cloud security with zero trust in action.- Video 1 starts as digest of zero trust concepts, categorizes the zero trust approach into 4 use cases with their corresponding IBM blueprints, then focuses on protection of the hybrid cloud by businesses that:
- Manage and control all accesses
- Monitor cloud activity and configurations
- Secure the cloud native workload
- Video 2 is a demonstration scenario of zero trust principles (Least privilege, Never trust - always verify, Implementation of adaptive access, and Continuous monitoring and optimization) in practice, applied to a hybrid cloud environment. The principles are exhibited with support from tools such as IBM Security Guardium Insights and X-Force Red Vulnerability Management and Service Portal.
Duration: 35 Minutes
Follow the link in related information to view the course on the IBM Security Learning Academy
Answer
The Security Learning Academy is a full service learning platform, providing various training objects and instruction options.
Related Information
[{"Business Unit":{"code":"BU008","label":"Security"},"Product":{"code":"SSQTTJ","label":"IBM Security Education"},"Platform":[{"code":"PF025","label":"Platform Independent"}],"Version":"All Version","Edition":" "}]
Was this topic helpful?
Document Information
Modified date:
07 February 2022
UID
ibm16554054