VPN to ZTNA: Managing the Transition

 

In recent years, we’ve seen zero-trust network access (ZTNA) replace the traditional VPN as best practice for implementing secure networking technologies. ZTNA follows a basic two-step process for managing network access - authenticate, then trust. If your organization is looking to transition from a VPN approach to one based on ZTNA, Zones can help. Andrew Reese, head of Zones’ cybersecurity practice, will discuss that process, alongside the team at Palo Alto Networks.

Andrew-Reese-200x230_Annie Kantor

Speaker: Andrew Reese

Position: Practice Head – Cybersecurity, Zones

Background: Andrew is a security and compliance subject matter expert with extensive hands-on experience measuring, assessing, designing, implementing, improving, and managing information security management systems (ISMS) as well as cybersecurity programs. He is well versed in aligning organizational controls with legal, regulatory, and contractual requirements as well as business goals and objectives. Andrew also has consulting experience working with hundreds of organizations of all sizes and verticals, using industry best practices.

Alex-Hostetter-Palo-Alto-b&w_Annie Kantor

Speaker: Alex Hostetter

Position: Systems Engineer, Palo Alto Networks

Background: Alex Hostetter is a Regional Systems Engineer at Palo Alto Networks. He covers the technical enablement and training for Palo Alto Channel Partners in the Southwest United States and currently resides in Los Angeles, California. Alex is a CISSP and holds a Masters of Cybersecurity from the George Washington University in Washington, DC.