Jump to content

Xage Zero Trust Blockchain-Protected Fabric for IIOT


Recommended Posts

[img]https://i.postimg.cc/fbYzJXMT/5483166-25a0.jpg[/img]
Xage Zero Trust Blockchain-Protected Fabric for IIOT
Last updated 8/2023
Duration: 3h53m | Video: .MP4, 1920x1080 30 fps | Audio: AAC, 48 kHz, 2ch | Size: 1.88 GB
Genre: eLearning | Language: English

Zero trust approach for access management for critical infrastructure

What you'll learn
Zero trust approach for access management for critical infrastructure including the operational technology
Zero trust secure local access for floor operations within the OT infrastructure itself
Securely facilitate vendor and third-party OEM remote access into the critical infrastructure down to the OT devices the L1 devices the PLCs and the RTUs
Enable Dynamic data security to secure the sharing of events and data streams from the OT devices to any external entity without exposing those OT systems
Cyber-hardening Interconnected Operations with an Asset and Identity-centric Approach
Modernizing Access Management with Zero Trust

Requirements
Basic IT and Linux/Unix skills

Description
Xage is specialized in Zero Trust approach for access management for critical infrastructure including the operational technology to serve basically three key use cases
1) Zero trust secure local access for floor operations within the OT infrastructure itself, as well as
2) Securely facilitate vendor and third-party OEM remote access into the critical infrastructure down to the OT devices the L1 devices the PLCs and the RTUs, as well as
3) Enable Dynamic data security to secure the sharing of events and data streams from the OT devices to any external entity without exposing those OT systems to any other networks
So all the sessions will always be terminated within the OT infrastructure itself to achieve that
Xage is basically three different products bonded into one single fabric platform
1) Identity-based Access Management
2) Zero trust Remote Access
3) Zero Trust Data Security
Xage does privilege access management, it basically allows you to create or integrate with active directory and create user accounts with specific privileges to Target critical devices where the Xage fabric will be the interface for accessing those critical devices and all the critical device credentials will not be exposed to the user, however it will be closely managed by the Xage fabric itself
In this course we will try to cover the following
- Foundations and Architecture
- Zero Trust Remote Access, File Transfer, and Data Exchange
- Installation and Deployment
- GUI demstifyied
- Access Management
- Device Management
- Policies
- Configure Users & User Groups with MFA
- WebSSH Access Policy with Authorization
- Session Collaboration
Who this course is for
IT Support, Security administrators, System administrators, Network administrators, SOC analyst

[code] https://rapidgator.net/file/af117d3f6363b842b980b41861c15122/xage-zero-trust-blockchain-protected-fabric-for-iiot.part1.rar.html
https://rapidgator.net/file/58f0975c2d693c08fe84ed5c64eec921/xage-zero-trust-blockchain-protected-fabric-for-iiot.part2.rar.html
[/code]


[code] https://uploadgig.com/file/download/e8c707D69a0bebb2/xage-zero-trust-blockchain-protected-fabric-for-iiot.part1.rar
https://uploadgig.com/file/download/33a378F096f74bd1/xage-zero-trust-blockchain-protected-fabric-for-iiot.part2.rar
[/code]


https://uploady.io/uj8au08t75vt
https://uploady.io/527hf2vtvg65
Link to comment
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
×
×
  • Create New...