SASE
The Limitations of SASE and Zero Trust
While SASE and Zero Trust work well for applications where it’s easy to identify valid users, these frameworks fail to address two specific areas of concern. The post The Limitations of SASE ...
Defending an Increasingly Blurred Perimeter with ZTNA and SASE
Forcepoint hosted the Cyber Voices Zero Trust Summit today. It was a virtual conference similar to the SASE CyberSummit they held back in June. One of the sessions that stood out was ...
Thwarting Malware Attacks with Bitglass
As more and more data is stored in the cloud and companies enable BYOD and remote work, comprehensive threat protection against known and zero-day malware becomes a critical need. Unfortunately, even some ...
Better Together: Akamai Enhances Zero Trust Network Access with CrowdStrike
More than ever before, users and applications no longer reside at the office. Organizations are managing a mobile and globally distributed workforce that needs access to corporate systems, applications, and data from ...
The Bitglass SASE Triangle: ZTNA for Internal Applications
Remote work, the remote workforce, working from home--all common phrases due to the series of unprecedented changes that have occured over the last several months. Organizations have had to adjust in order ...
Getting Sassy About SASE – the Value of Edge Security
As a former Gartner analyst and now a strategist at Akamai, I have had several conversations with CISOs across the world on the topic of 'designing a future-ready security architecture' ...
The Bitglass SASE Triangle: SWG for Securing Web Traffic
In today’s modern workforce, the enterprise attack surface is larger than ever before; with cloud apps, personal devices, on-premises resources, web destinations, and more. As a result, organizations are in need of ...
The Bitglass SASE Triangle: CASB for Managed Apps
As organizations continue to migrate to the cloud and enable remote work and BYOD, the complexity of keeping sensitive data secured continues to grow. Enterprises that fail to adapt to the modern ...
A Vantage Point to See Threats Before Impact
We recently observed another near-compromise / near-breach event. At a time when the focus has been on adversaries that develop increasingly complex and sophisticated attacks, tried and true techniques such as compromised ...
Security Architecture podcast and the Bitglass SASE
With the rapid growth of the remote workforce, organizations are in need of a comprehensive security platform that offers a plethora of capabilities for securing today’s business environment. Recently, on Security Architecture, ...

