BEGIN:VCALENDAR
VERSION:2.0
X-WR-CALNAME:BrightTALK Event
PRODID:-//BrightTALK//NONSGML BrightTALK Event Calendar//EN
CALSCALE:GREGORIAN
METHOD:REQUEST
BEGIN:VEVENT
UID:https://www.brighttalk.com/webcast/15855/667545
DTSTAMP:20260428T165557Z
ORGANIZER:MAILTO:noreply@brighttalk.com
LOCATION:BrightTALK
URL:https://www.brighttalk.com/webcast/15855/667545?utm_campaign=commu
 nication_reminder_24hr_registrants&utm_medium=calendar&utm_source=brig
 httalk-transact
DTSTART:20260514T150000Z
DTEND:20260514T153000Z
SUMMARY:Live webcast: ZTNA in Action: A Practical Path Beyond VPNs to 
 Secure Remote Access
DESCRIPTION:Click here to attend: https://www.brighttalk.com/webcast/1
 5855/667545?utm_campaign=communication_reminder_24hr_registrants&utm_m
 edium=calendar&utm_source=brighttalk-transact\n\nPresenter: Dhiraj Seh
 gal, Senior Director, Product Marketing & Padmanabhan, Senior Systems 
 Engineer\n\nAs legacy VPN solutions approach end-of-life, organization
 s are moving from evaluating Zero Trust strategies to actively replaci
 ng traditional remote access infrastructure. Security and IT leaders m
 ust now answer critical questions: how to transition from VPN to Zero 
 Trust without disrupting users, maintain visibility and control across
  hybrid environments, and ensure that today's architecture supports a 
 broader SASE strategy.\nIn this session, Versa experts will walk throu
 gh a practical roadmap for replacing VPN with Zero Trust Network Acces
 s (ZTNA) while maintaining operational continuity and strengthening se
 curity.\nYou'll learn how modern ZTNA architectures provide identity- 
 and context-aware access controls, continuous verification, and integr
 ated security inspection to protect users accessing applications acros
 s data centers, SaaS platforms, and hybrid cloud environments.\nThis s
 ession will cover:\n• Key operational challenges organizations face wh
 en replacing VPN with ZTNA\n• How ZTNA enforces identity- and context-
 aware access policies across distributed environments\n• The architect
 ural decisions that ensure ZTNA deployments evolve into full SASE plat
 forms\n• How unified ZTNA provides continuous verification, device pos
 ture checks, and inline threat protection\n• A phased migration strate
 gy that allows VPN and ZTNA to coexist during transition\nJoin us to l
 earn how organizations are modernizing remote access by moving beyond 
 VPNs to secure, scalable Zero Trust architectures that improve both se
 curity posture and user experience.
SEQUENCE:1778684292
END:VEVENT
END:VCALENDAR
