Rethinking Defensive Strategy at the Edge, Part 3: Strategies for Protective Action

Our three-part blog series, Re-thinking Defensive Strategy at the Edge, has been focusing on outlining a new defensive edge strategy for today’s enterprise. We began with a discussion of data and indicators. Most recently, our second post focused on using risk signals and correlating them for improved security controls. This last post in the series will transition the discussion from data and correlation into how to use these to enable adaptive actionable protection strategies. Continue reading Rethinking Defensive Strategy at the Edge, Part 3: Strategies for Protective Action

Rethinking Defensive Strategy at the Edge, Part 2: Risk Signals as Security Controls

In the first post in our blog series Rethinking Defensive Strategy at the Edge, we began to outline why a new defensive edge strategy is needed for today’s enterprise. As previously mentioned, the strategy enhances those in place and introduces another layer of defense that includes the following three components: data and indicators, risk-based signals and entities, and protective actions. This post explores user entities as well as risk-based signals that can be leveraged to improve this updated defensive strategy. Continue reading Rethinking Defensive Strategy at the Edge, Part 2: Risk Signals as Security Controls

Rethinking Defensive Strategy at the Edge, Part 2: Risk Signals as Security Controls

In the first post in our blog series Rethinking Defensive Strategy at the Edge, we began to outline why a new defensive edge strategy is needed for today’s enterprise. As previously mentioned, the strategy enhances those in place and introduces another… Continue reading Rethinking Defensive Strategy at the Edge, Part 2: Risk Signals as Security Controls

Rethinking Defensive Strategy at the Edge, Part 1: A Changing Landscape for Securing Users

In recent years, new enterprise remote access architectures and frameworks have been introduced, such as Zero Trust Access (ZTA). Those concepts have driven changes in the way the network perimeter has been defined — specifically, from the outside in, not the inside out. Access to applications and services usually start from users and devices outside of traditional on-premises network perimeters. Continue reading Rethinking Defensive Strategy at the Edge, Part 1: A Changing Landscape for Securing Users

Rethinking Defensive Strategy at the Edge, Part 1: A Changing Landscape for Securing Users

In recent years, new enterprise remote access architectures and frameworks have been introduced, such as Zero Trust Access (ZTA). Those concepts have driven changes in the way the network perimeter has been defined — specifically, from the outside in,… Continue reading Rethinking Defensive Strategy at the Edge, Part 1: A Changing Landscape for Securing Users

Zero-Trust: Stay Safe While Working Remotely

A zero-trust security model can help organizations and their employees stay secure, no matter where they’re located Up until February of this year, working remotely was typically looked upon as a growing benefit for employees. The opportunity to… Continue reading Zero-Trust: Stay Safe While Working Remotely