Safe-T Blog
Read our blog about Zero Trust Network Access in corporate settings.
Iranian-backed Fox Kitten APT Exploits VPN Vulnerabilities – Here’s Why it Should Matter to You
Eitan Bremler, VP Products and Technology | | Citrix, Fox Kitten, SDP, Secure Application Access, VPN, what is SDP?, what is software defined perimeter, what is zero trust, ZTNA
Collaboration is a great thing isn't it? ...
Zero Trust Can Fix Healthcare’s Security Problem
Eitan Bremler, VP Products and Technology | | healthcare industry, hospitals data breach, SDP, Secure Application Access, Software-defined perimeter, what is zero trust, what is zero trust network access, zero trust network access, ZTNA
Hospitals and other healthcare facilities are under attack from cyber criminals. In 2019 healthcare was one of the most targeted industries. In the first half of 2019 alone, there were 168 attacks ...
Zero Trust Trends to Watch Out For in 2020
Shachar Daniel, CEO | | Network Security, SDP, Secure Application Access, Software-defined perimeter, VPN, what is zero trust, what is zero trust network access, zero trust network access
We all know Zero Trust is the new norm.The term, along with the model it defines, went from relative obscurity to having “household-name” status (well, if the people in your household work ...
VPNs—Better Off With ‘Em Or Without ‘Em?
Joni Elbaz | | Network Security, SDP, Secure Application Access, Software-defined perimeter, VPN, what is SDP?, what is software defined perimeter, what is zero trust network access, zero trust network access
Do VPNs make you more or less secure? This is a question many companies found themselves asking in 2019 ...
Time for Something New…
Six years ago, we started Safe-T to bring consistency and simplicity to secure access. We knew, back in the early days of the digital transformation, that attackers would use this new opportunity ...
4 DMZ Best Practices to Shield You From Attackers
In the cloud era, the DMZ has become more important – and more vulnerable – than its original architects ever thought possible ...
ZoneZero™ can Prevent Further Lateral Movement Within Compromised Organizations.
VPNs have been a cornerstone of secure networking for the last 20+ year. They provide employees and third parties with secure remote access to corporate networks and services. However, as technology evolves, ...
Safe-T SDP- Why Rip and Replace your VPN?
Although organizations realize the need to upgrade their approach to user access control. The deployment of existing technologies is holding back the introduction of Software Defined Perimeter (SDP). A recent report carried ...
Building Zero Trust With a Software Defined Perimeter
Eitan Bremler | | cyberattack, Data breach, Network Security, Secure data access, Software-defined perimeter
Back in 2010, John Kindervag, the then-principal analyst at Forrester, coined the term Zero Trust. The idea behind this edgy-sounding concept was that when it comes to network security, nothing can be ...
SAFE-T; A Progressive Approach To Zero Trust Access
The foundations that support our systems are built with connectivity and not security as an essential feature. TCP connects before it authenticates. Security policy and user access based on IP lack context ...