SASE vs Zero Trust

As we start the new year and see companies begin their plans and execution for “the new normal”, a topic of discussion from a past Customer Advisory has become much more pronounced: what is the relationship between Zero Trust and Secure Access Service… Continue reading SASE vs Zero Trust

Menlo Security Named a Visionary in Gartner’s MQ for Secure Web Gateways Three Years in a Row

We believe the report validates customer migration from on-premises to the cloud and security functions’ convergence into a SWG platform architecture.
Gartner’s 2020 Magic Quadrant for Secure Web Gateways (SWG) is now live, and Menlo Security has … Continue reading Menlo Security Named a Visionary in Gartner’s MQ for Secure Web Gateways Three Years in a Row

The Limitations of SASE and Zero Trust

While SASE and Zero Trust work well for applications where it’s easy to identify valid users, these frameworks fail to address two specific areas of concern.
The post The Limitations of SASE and Zero Trust appeared first on K2io.
The post The Limitatio… Continue reading The Limitations of SASE and Zero Trust

Thwarting Malware Attacks with Bitglass

As more and more data is stored in the cloud and companies enable BYOD and remote work, comprehensive threat protection against known and zero-day malware becomes a critical need. Unfortunately, even some of the largest organizations have fallen victi… Continue reading Thwarting Malware Attacks with Bitglass

Better Together: Akamai Enhances Zero Trust Network Access with CrowdStrike

More than ever before, users and applications no longer reside at the office. Organizations are managing a mobile and globally distributed workforce that needs access to corporate systems, applications, and data from outside the traditional network per… Continue reading Better Together: Akamai Enhances Zero Trust Network Access with CrowdStrike

Better Together: Akamai Enhances Zero Trust Network Access with CrowdStrike

More than ever before, users and applications no longer reside at the office. Organizations are managing a mobile and globally distributed workforce that needs access to corporate systems, applications, and data from outside the traditional network perimeter. In addition, cyberattackers are exploiting this situation with an increase in malware and phishing attacks aimed at remote workers. Continue reading Better Together: Akamai Enhances Zero Trust Network Access with CrowdStrike

Getting Sassy About SASE – the Value of Edge Security

As a former Gartner analyst and now a strategist at Akamai, I have had several conversations with CISOs across the world on the topic of ‘designing a future-ready security architecture’.
The post Getting Sassy About SASE – the Value of Edge Secur… Continue reading Getting Sassy About SASE – the Value of Edge Security

The Bitglass SASE Triangle: SWG for Securing Web Traffic

In today’s modern workforce, the enterprise attack surface is larger than ever before; with cloud apps, personal devices, on-premises resources, web destinations, and more. As a result, organizations are in need of a context-aware solution that can en… Continue reading The Bitglass SASE Triangle: SWG for Securing Web Traffic

How Zero Trust and SASE Can Redefine Network Defenses for Remote Workforces

The SASE model for remote access and security coupled with Zero Trust can help redefine network and perimeter defenses when a traditional “perimeter” no longer exists. Continue reading How Zero Trust and SASE Can Redefine Network Defenses for Remote Workforces