Recorded Webinar

Achieving Zero Trust Security with Accenture, Microsoft Azure, and Palo Alto Networks

The number of organizations adopting multi-cloud is on the rise. They are now evaluating effective ways to safeguard their applications, infrastructure, and network communications. Security in the cloud is being recast from static and IP-based defined by a perimeter to dynamic and identity-based with no clear perimeter. This idea is known as Zero Trust security. View our virtual webinar series with Accenture, Microsoft Azure, and Palo Alto Networks to learn best practices, tools and workflows to enable your teams to harden their defense.

Intro to Zero Trust Security with HashiCorp

More people are using cloud today than ever before and as organizations are moving to cloud, the challenges around securing applications, networks, and people are changing too. At HashiCorp, we believe identity is the basis for security in which all access is granted and revoked. Identity ensures that the right applications, services, or people are who or what they say they are and that everything leverages trusted identity platforms organizations are already using day-to-day.

In this session you’ll learn more around the key security challenges facing organizations today and how HashiCorp can solve some of these challenges.

  • Chris Kent
    Chris KentSenior Director Product Marketing, Security & Networking

Accenture's Approach to Zero Trust Security

During our cloud journey at Accenture we experienced, first-hand, the power of secrets management in the cloud at Accenture's size, scale, and complexity. With 95% of our applications now in the cloud, we have found that there is no element of security that cloud solutions cannot support.

View our session to learn about the guiding principles we used to achieve security in the cloud operating model with HashiCorp Vault.

  • Krishna Dasari
    Krishna DasariManaging Director, Digital Identity

Microsoft Azure & HashiCorp: Protecting Your Data in a Zero Trust World

The idea of zero trust is becoming the standard in a cloud-centric, BYOD world. How can you protect your data even when people are working from home, on devices you don’t manage and on networks you don’t trust? It starts with ensuring user identities are secure. You can then use identity as the control plane upon which all other access decisions are based.

In this session, we'll talk about how you can use complementary solutions from Microsoft and HashiCorp to protect your digital assets.

  • Iman Randhawa
    Iman RandhawaPartner Solutions Engineer
  • David Branscome
    David BranscomeGlobal Enablement Lead for Security, Compliance and Identity

Zero Trust Security Practices with Consul-Terraform Sync & Palto Alto Networks Next Generation Firewalls

Cloud adoption is on the rise. As a result the perimeter as we know it is eroding. Enterprises are considering new ways to protect themselves as their attack surface expands with the adoption of new cloud service providers and technologies such as ephemeral environments. Zero trust security has emerged as an effective framework for safeguarding enterprises by emphasizing they trust nothing and verify everything.

Watch this session to learn how HashiCorp Consul-Terraform-Sync seamlessly integrates with Palo Alto Networks’ Next Generation Firewalls to bolster its critical role as a segmentation gateway in prevailing zero trust architectures.

  • Sebastian Maniak
    Sebastian ManiakSr. Solutions Engineer
  • Migara Ekanayake
    Migara EkanayakeGlobal Solution Architect, Security Automation

More resources like this one

  • 4/11/2024
  • FAQ

Introduction to HashiCorp Vault

Vault identity diagram
  • 12/28/2023
  • FAQ

Why should we use identity-based or "identity-first" security as we adopt cloud infrastructure?

  • 3/14/2023
  • Article

5 best practices for secrets management

  • 2/3/2023
  • Case Study

Automating Multi-Cloud, Multi-Region Vault for Teams and Landing Zones