Gigamon: Zero Trust the Result of Porous Networks, Relentless Attacks
Shehzad Merchant, CTO of Gigamon, explains the prominence of the Zero Trust security strategy, including what is – and isn't. He also discusses the role of analytics in a Zero-Trust implementation as well as what new adopters can expect over time after they deploy the technology.
1 Min Read
![](https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/bltc94608acf452fd67/655cf371ab171e040a838b2a/329050_DR23_Graphics_Website_V5_Default_Image_v1.png?width=1280&auto=webp&quality=95&format=jpg&disable=upscale)
About the Author(s)
Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.
You May Also Like
More Insights
Webinars
CISO Perspectives: How to make AI an Accelerator, Not a Blocker
August 20, 2024Securing Your Cloud Assets
August 27, 2024
Events