IBM Support

Zero trust - Protect the hybrid cloud

Question & Answer


Question

This pair of videos inspire you to reimagine your hybrid cloud security with zero trust in action.

  • Video 1 starts as digest of zero trust concepts, categorizes the zero trust approach into 4 use cases with their corresponding IBM blueprints, then focuses on protection of the hybrid cloud by businesses that:
    • Manage and control all accesses
    • Monitor cloud activity and configurations
    • Secure the cloud native workload
  • Video 2 is a demonstration scenario of zero trust principles (Least privilege, Never trust - always verify, Implementation of adaptive access, and Continuous monitoring and optimization) in practice, applied to a hybrid cloud environment. The principles are exhibited with support from tools such as IBM Security Guardium Insights and X-Force Red Vulnerability Management and Service Portal.

Duration: 35 Minutes
Follow the link in related information to view the course on the IBM Security Learning Academy

Answer

The Security Learning Academy is a full service learning platform, providing various training objects and instruction options.

[{"Business Unit":{"code":"BU008","label":"Security"},"Product":{"code":"SSQTTJ","label":"IBM Security Education"},"Platform":[{"code":"PF025","label":"Platform Independent"}],"Version":"All Version","Edition":" "}]

Document Information

Modified date:
07 February 2022

UID

ibm16554054