The CISO Perspective 2023-02-20 09:19:54

At one point, virtual private networks (VPNs) were a valuable tool for remote workers to access private networks and data centers. But with more and… ...
The Age of Any Access – Zero Trust Evolution, Trends, and What’s Next - Part 1

Pulse Secure Joins Forces with Ivanti Alongside MobileIron

I am pleased to announce that Pulse Secure has signed a definitive agreement to be acquired by Ivanti, a leading provider of enterprise-grade, intelligent IT management and security software solutions. Ivanti is ...
Resetting Client Device Management

Resetting Client Device Management

Data is like water.  It ends up flowing freely through devices and cloud services like water down a river.  And users are bringing in an evolving group of devices and using more ...
Addressing Bring Your Own Technology

Addressing Bring Your Own Technology

How to implement a Bring Your Own Technology strategy is still one of the most rampant conversations we have everyday with businesses.  There is no single technology that is going to make ...
Why most NAC deployments fail

Why most NAC deployments fail

Network Access Control.  Another somewhat ambiguous yet ubiquitous security term floating around for a decade.  The principle of NAC is legit.  The goal is to make sure only authorized users and devices ...

Choosing to BYOC

When given the choice to BYOC I was instantly excited and images of Ubuntu or OS X flashed through my mind.Bring Your Own Computer is actually starting to take off. Many of ...