With such heightened scrutiny around cybersecurity threats in today’s world, ensuring all applications are as secure as possible is absolutely necessary. Utilizing the proper authentication and authorization frameworks to grant access to the proper set of users is undoubtedly a vital part of that. But is that enough? Whether you are operating within the cloud or on-premises deployment, what else can be done to protect your assets from a rogue user or application such that you can operate with a zero-trust model in mind? Join us to discuss various techniques, from limiting network communication to restricting allowed application-level permissions, for keeping your SAS Viya environment secure.
... View more