Product

Docs

Customers

Resources

Partners

Product

Docs

Customers

Resources

Partners

LIVE WORKSHOP: AUG 22, 11AM PT / 2PM ET

Zero Trust: Secure
Workloads in AWS

Speaker

We process your information in accordance with our Privacy Policy

We process your information in accordance with our Privacy Policy

Bren Sapience

Director of Solutions Engineering | Twingate

Traditional VPNs rely on a central gateway, creating a significant risk as a single point of failure. If this gateway goes down, all connected users lose access to the network. Moreover, public endpoints are vulnerable to exploitation by malicious actors, potentially exposing all resources. In contrast, Zero Trust Network Access (ZTNA) provides point-to-point connectivity with no open ports, offering more reliable and secure remote access.

During our workshop, Bren will guide you through the core concepts of Zero Trust, from addressing modern cybersecurity challenges to implementing ZTNA for secure remote access to AWS resources.

You’ll learn how to apply granular security controls to AWS resources, deploy a connector to close open ports and reduce the attack surface, and continuously assess the security landscape to protect your cloud infrastructure from both internal and external threats.

Other Webinars

ON DEMAND

How DevOps Uses Zero Trust

ON DEMAND

How DevOps Uses Zero Trust

ON DEMAND

How DevOps Uses Zero Trust

ON DEMAND

From Chaos to Consistency: Achieving 99.9% Reliability in Just 6 Months

ON DEMAND

From Chaos to Consistency: Achieving 99.9% Reliability in Just 6 Months

ON DEMAND

From Chaos to Consistency: Achieving 99.9% Reliability in Just 6 Months

We process your information in accordance with our Privacy Policy

We process your information in accordance with our Privacy Policy

Key Takeaways:

Understanding the fundamentals of Zero Trust security

Best practices for applying Zero Trust principles in AWS environments

Strategies for securing cloud resources from internal and external threats

Real-world example of how to secure AWS workloads

Interactive Q&A session