Software-defined perimeter

What is Zero Trust Network Access (ZTNA)? The Zero Trust model, Framework and Technologies Explained
andyh28@outlook.com | | Cato Networks, Check Point, cloud provider, CloudFlare, connection, context, Control plane, Data plane, Datacenter, de-centralized solution, enforcement, firewall, Fortinet, HQ location, identity, logical access boundaries, Network Equipment, Network Security, on premise, Palo Alto Prisma Access, SASE, SDP, Security Concepts, security posture, Security Service Edge, security strategy, security technologies, Software-defined perimeter, technology, trust broker, Uncategorized, vendor, zero trust network access, zero trust security, Zscaler
Virtual Private Networks (VPNs) have been used for years to provide remote connectivity, but they have limitations in terms of scalability and security. A technology… ...

Why VPNs and Passwords Aren’t Enough
Sometimes it’s the littlest things that can make the biggest difference. Take passwords, for instance. While few would argue against the necessity of choosing a strong password, many companies and employees continue ...
Security Boulevard

DH2i Extends Software-Defined Perimeter to IoT Devices
DH2i has launched DxOdyssey for IoT, an instance of its software-defined perimeter (SDP) and smart availability software encapsulated in a lightweight container to enable it to run on internet of things (IoT) ...
Security Boulevard

Ivanti Acquires MobileIron and Pulse Secure
Michael Vizard | | acquisitions, Cybersecurity, mobile endpoint security, security functions as a service, Software-defined perimeter, work from home
Ivanti this week announced it has entered into a pair of agreements to acquire MobileIron and Pulse Secure as part of an effort to create a zero-trust platform that can be delivered ...
Security Boulevard

RasPi and SDP: Ensuring Impenetrable Perimeters in a Perimeterless World
Don Boxley | | cloud services, iot, Network perimeter, Raspberry Pi, SDP, Software-defined perimeter
Since its introduction, the lightweight yet effective credit card-sized Raspberry Pi (RasPi) computer has grown steadily in global popularity. This is because the RasPi offers an easy-to-learn (it originated as an educational ...
Security Boulevard
Zero Trust Can Fix Healthcare’s Security Problem
Eitan Bremler, VP Products and Technology | | healthcare industry, hospitals data breach, SDP, Secure Application Access, Software-defined perimeter, what is zero trust, what is zero trust network access, zero trust network access, ZTNA
Hospitals and other healthcare facilities are under attack from cyber criminals. In 2019 healthcare was one of the most targeted industries. In the first half of 2019 alone, there were 168 attacks ...
Zero Trust Trends to Watch Out For in 2020
Shachar Daniel, CEO | | Network Security, SDP, Secure Application Access, Software-defined perimeter, VPN, what is zero trust, what is zero trust network access, zero trust network access
We all know Zero Trust is the new norm.The term, along with the model it defines, went from relative obscurity to having “household-name” status (well, if the people in your household work ...
VPNs—Better Off With ‘Em Or Without ‘Em?
Joni Elbaz | | Network Security, SDP, Secure Application Access, Software-defined perimeter, VPN, what is SDP?, what is software defined perimeter, what is zero trust network access, zero trust network access
Do VPNs make you more or less secure? This is a question many companies found themselves asking in 2019 ...

Shielding Applications to Prevent DDoS Attacks
Micha Rave | | ddos, distributed denial of service, software defined networking, Software-defined perimeter
A software-defined perimeter can be an integral tool in protecting against DDoS attacks One common security threat that corporate networks, applications and web-based services have been failing to effectively defend against is ...
Security Boulevard
Time for Something New…
Six years ago, we started Safe-T to bring consistency and simplicity to secure access. We knew, back in the early days of the digital transformation, that attackers would use this new opportunity ...