Internet Threat Protection (or, how not to treat your org like middle schoolers)

Internet Threat Protection (or, how not to treat your org like middle schoolers)

| | Blog, how to
Ok, y’all, we are now in the middle of post-covid work environments where the freedom of location has been a selling point for companies that have remote positions. But this freedom pairs with the adage “with great power comes great responsibility,” where we are relying on our end users to ... Read More
Trust Profile Screenshot

The FACTS about Banyan’s New Granular Trust Scoring

Banyan Security is ecstatic to introduce phase 2 of our Granular Trust Scoring (GTS) feature set. Phase 2 includes the ability to create a Trust Profile. Trust Profiles allow an admin to assign trust factors to different groups of devices, with available assignment criteria of; user groups, serial numbers, operating ... Read More
Trust Profile Screenshot

The FACTS about Banyan’s New Granular Trust Scoring

Banyan Security is ecstatic to introduce phase 2 of our Granular Trust Scoring (GTS) feature set. Phase 2 includes the ability to create a Trust Profile. Trust Profiles allow an admin to assign trust factors to different groups of devices, with available assignment criteria of; user groups, serial numbers, operating ... Read More
Trust Factor Screenshot

Getting Control Over Device Trust

Banyan recently announced a new granular trust scoring feature, called Trust Effect, for device trust and security posture. Here is how it works. The post Getting Control Over Device Trust first appeared on Banyan Security ... Read More
Digital Nomand Van

Nervous for the Digital Nomad ‘Talk’ with your Boss?

| | Blog
One of the first things you need to do when choosing to become a digital nomad is to clear the lifestyle change with your leadership. Below helps you navigate that conversation by understanding what their concerns will be and how to alleviate them. The post Nervous for the Digital Nomad ... Read More
Service Tunnel vs VPN

Introducing Banyan’s Service Tunnel

| | Blog
You’re not the only one holding back applause. You’re certainly not the only one wondering, “why would a zero trust company be announcing a VPN-like feature? It’s counterproductive to the goal of zero trust.” And your intuition may be correct: our research suggests that organizations are finding it challenging to ... Read More