Zero Trust: 3 Critical Considerations

Forescout's Bob Reny on Reducing Complexity While Raising Protection
Bob Reny, EMEA CTO, Forescout Technologies

Done right, a zero trust architecture can reduce the complexity of one’s environment while also improving cybersecurity protection and efficiency. Bob Reny of Forescout focuses on three critical considerations: visibility, compliance and control.

See Also: The DevSecGuide to Kubernetes

In a video interview with Information Security Media Group, Reny discusses:

  • Guiding principles of zero trust;
  • The three key considerations;
  • Business benefits to be achieved.

As Principal Security Engineer and EMEA CTO at Forescout, Reny is focused on current trends including IoT, software defined networks, and the evolving threats to enterprise infrastructure including core datacenter, cloud and operational technology.


About the Author

Tom Field

Tom Field

Senior Vice President, Editorial, ISMG

Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world, as well as ISMG's series of exclusive executive roundtables.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.