Syndicated Blog

Safe-T Blog
Read our blog about Zero Trust Network Access in corporate settings.

Zero Trust Can Fix Healthcare’s Security Problem

Hospitals and other healthcare facilities are under attack from cyber criminals. In 2019 healthcare was one of the most targeted industries. In the first half of 2019 alone, there were 168 attacks ...

Zero Trust Trends to Watch Out For in 2020

We all know Zero Trust is the new norm.The term, along with the model it defines, went from relative obscurity to having “household-name” status (well, if the people in your household work ...

Time for Something New…

Six years ago, we started Safe-T to bring consistency and simplicity to secure access. We knew, back in the early days of the digital transformation, that attackers would use this new opportunity ...

4 DMZ Best Practices to Shield You From Attackers

In the cloud era, the DMZ has become more important – and more vulnerable – than its original architects ever thought possible ...

ZoneZero™ can Prevent Further Lateral Movement Within Compromised Organizations.

VPNs have been a cornerstone of secure networking for the last 20+ year. They provide employees and third parties with secure remote access to corporate networks and services. However, as technology evolves, ...

Safe-T SDP- Why Rip and Replace your VPN?

Although organizations realize the need to upgrade their approach to user access control. The deployment of existing technologies is holding back the introduction of Software Defined Perimeter (SDP). A recent report carried ...

Building Zero Trust With a Software Defined Perimeter

Back in 2010, John Kindervag, the then-principal analyst at Forrester, coined the term Zero Trust. The idea behind this edgy-sounding concept was that when it comes to network security, nothing can be ...

SAFE-T; A Progressive Approach To Zero Trust Access

The foundations that support our systems are built with connectivity and not security as an essential feature. TCP connects before it authenticates. Security policy and user access based on IP lack context ...