Loading...
right-arrow (6)Back
Zero Trust
Video Demo

Zero Trust Architecture workshop: How to apply ZTA to real networks

Zero Trust Architecture (ZTA) is a modern cybersecurity approach based on the idea of “never trust, always verify.”

This video breaks down the basics of ZTA and shows how to use them in real networks. Through simple examples, we cover authentication, authorization, segmentation, threat response, and how ZTA works with firewalls, IDS/IPS, and other security tools.

See how ALE makes Zero Trust easier with dynamic micro-segmentation and open standards.

Zero Trust is a journey—let’s take the next step together.

Patricio Martelo

Patricio Martelo is the Director of Network Solutions Architecture and is responsible for the Solution Lab at ALE. He’s been designing and consulting on large-scale network architecture for 20 years. He enjoys teaching as well as rolling up his sleeves to build and test things out for himself. From time to time, he develops his own bespoke solutions in Python or other languages. His current focus includes cybersecurity (CISSP #704531), network automation, data centre, cloud and software-defined networking. Patricio holds a BScs. degree in Electronics Engineering from the University of Buenos Aires and MSc. degree in Telecommunications from the University of Pittsburgh, where he studied as a Fulbright scholar.

Loading