Is Your ZTNA Vendor Really Zero-Trust?

A recent article defined ZTNA (zero-trust network access) and delivered recommendations on how to get the best results from ZTNA. The piece also touched on the importance of selecting a zero-trust vendor that is truly zero-trust. But that was just the… Continue reading Is Your ZTNA Vendor Really Zero-Trust?

Protecting the Hybrid Cloud With Zero-Trust

Cloud security is tough enough, but hybrid cloud adds a few extra challenges, such as visibility between cloud platforms and the difficulty of remaining current with compliance protocols for industry and government regulations. Is zero-trust the answe… Continue reading Protecting the Hybrid Cloud With Zero-Trust

Palo Alto Networks Makes a Case for Zero-Trust IT

Palo Alto Networks today announced it has extended its security portfolio as part of an effort to streamline the time and effort required for organizations to create and maintain a zero-trust IT environment across an extended enterprise. New capabilit… Continue reading Palo Alto Networks Makes a Case for Zero-Trust IT

JumpCloud Adds MFA Capability to Enable Zero-Trust

JumpCloud today announced it is adding a free one-touch multifactor authentication (MFA) capability to its directory to make it simpler to implement a zero-trust IT environment. Greg Keller, JumpCloud CTO, says JumpCloud Protect enables IT organizatio… Continue reading JumpCloud Adds MFA Capability to Enable Zero-Trust

Simplicity is the Necessary Killer Security Feature

Pre-COVID-19, IT and security teams were being challenged by too many projects, a lack of resources and teams that lacked enough people. After a year like no other, there is much self-congratulation going on about compressing five years of digital tra… Continue reading Simplicity is the Necessary Killer Security Feature

Achieving Data Protection With SASE

Data is the ultimate asset of modern business and the foundation of digital transformation. It is the currency that funds innovation and growth. Data must be protected with the utmost rigor, but it must also flow effortlessly to where it can deliver t… Continue reading Achieving Data Protection With SASE

Smart IAM: The Key to Seamless Sign-Ons

In a connected, but still remote, world, employees are logging in from countless devices and locations. Behaviors that were once uncommon – like accessing the corporate network on multiple or personal devices – are commonplace today. Driven by the exp… Continue reading Smart IAM: The Key to Seamless Sign-Ons

How to Get the Best Results From ZTNA

The pandemic greatly expanded the work-from-home population. Due to the pandemic, 86% of IT leaders say that at least a quarter of their staff members are connecting to corporate networks through personal and shared devices. But even before the pandem… Continue reading How to Get the Best Results From ZTNA

Betting Big on Identity and Authentication

Last year, 2020, was a year of accelerated digital transformation with COVID-19 related lockdowns pushing preexisting trends into overdrive. We saw more quantum leaps in cloud adoption, remote work and digital transformation in a single year than we&#… Continue reading Betting Big on Identity and Authentication

Survey Sees Accelerated Shift Toward Zero-Trust Architectures

A shift toward zero-trust architectures appears to be gaining momentum, with a global survey of 500 senior cybersecurity executives published today showing that 40% of respondents have launched an initiative to achieve that goal. In North America, the … Continue reading Survey Sees Accelerated Shift Toward Zero-Trust Architectures