text
hidden text to trigger early load of fonts ПродукцияПродукцияПродукцияПродукция Các sản phẩmCác sản phẩmCác sản phẩmCác sản phẩm المنتجاتالمنتجاتالمنتجاتالمنتجات מוצריםמוצריםמוצריםמוצרים

Zero Trust at the SASE Regional Edge

-- Generating

If download hasn't started

Course Overview

Discover the concept of Zero Trust Network Access (ZTNA)—a core cybersecurity capability. Expanding upon the previous course’s introduction of the NIST Zero Trust maturity model, this training offers a practical SASE (Secure Access Service Edge) deployment example and also explores the Intel supporting technologies that help make it possible. Intel technologies, including Intel® Xeon® processors, Intel® Quick Assist Technology (Intel® QAT), and Intel® Threat Detection Technology (Intel® TDT) all play a pivotal role in this framework, helping enable advanced encryption, threat detection and secure access. Explore the evolution from traditional VPN-based approaches to ZTNA, with its reliance on explicit trust and continuous monitoring to help safeguard corporate resources from unauthorized access.

Share With

Chapter 1: Zero Trust at the SASE Regional Edge

Chapter List

Quiz Status

Please watch the video before taking the quiz.

Once you have watched the video, please take the quiz.

Chapter Overview

Discover the concept of Zero Trust Network Access (ZTNA)—a core cybersecurity capability. Expanding upon the previous course’s introduction of the NIST Zero Trust maturity model, this training offers a practical SASE (Secure Access Service Edge) deployment example and also explores the Intel supporting technologies that help make it possible. Intel technologies, including Intel® Xeon® processors, Intel® Quick Assist Technology (Intel® QAT), and Intel® Threat Detection Technology (Intel® TDT) all play a pivotal role in this framework, helping enable advanced encryption, threat detection and secure access. Explore the evolution from traditional VPN-based approaches to ZTNA, with its reliance on explicit trust and continuous monitoring to help safeguard corporate resources from unauthorized access.