Language Selection

Your selected language is currently:


Theme: Zero trust security

Zero Trust has emerged as a groundbreaking paradigm that challenges traditional network security. At its core, Zero Trust operates on the principle that no user or device should be trusted, regardless of their location within the network. This approach has gained significant traction due to its proactive stance against cyber threats and adaptability to emerging technologies.

Leveraging the power of cutting-edge tools such as real-time threat detection and response systems, continuous monitoring and advanced behavioral analytics, Zero Trust frameworks empower organizations to detect and mitigate potential threats swiftly, minimizing the risk of data breaches. Additionally, technologies like secure access service edge (SASE) enable seamless and secure access to company resources, even in the face of a dynamic and geographically dispersed workforce.

Embracing Zero Trust security aligns with Unisys’ commitment to safeguarding sensitive information and ensuring a resilient cybersecurity posture. Here are a few scenarios that you may consider:

  • Real-time threat detection and response
  • Data breach prevention strategies
  • Multi-factor authentication for remote workers
  • Access monitoring and behavior analysis
  • Industrial IoT device isolation

Students are encouraged to brainstorm innovative ideas incorporating the technologies listed below, explore unconventional approaches and develop creative solutions:

Identity and access management (IAM) Cybersecurity Micro-segmentation Secure access service edge (SASE)
Multi-factor authentication (MFA) Intrusion detection and prevention systems (IDPS) Software-defined networking (SDN) Secure web gateways (SWG)
Single sign-on (SSO) Security information and event management (SIEM) Network virtualization (NV) Cloud access security brokers (CASB)
Identity providers (IdP) Endpoint detection and response (EDR) and extended detection and response (XDR) Network access control (NAC) Software-defined wide area network (SD-WAN)
Privileged access management (PAM) Data loss prevention (DLP)   Zero Trust network access (ZTNA)