Scott Gordon

-February 13, 2020

Zero Trust – Big Aspirations, High Hopes, What Next
Read More
Zero Trust – Big Aspirations, High Hopes, What Next

Zero Trust – Big Aspirations, High Hopes, What Next

In the world of Zero Trust, there appears to be some dichotomy between action and confidence. A recent Cybersecurity Insiders survey of over 400 IT security professionals found that while 73% of organizations have or plan to implement Zero Trust capabilities this year, nearly half of respondents lack confidence in its application. Here are some highlights of the published Zero Trust Progress Report.

read more
Categories Latest Research Solution
Enable Zero Trust with Secure Access Policies

Enable Zero Trust with Secure Access Policies

Digital adoption and other technological innovations in the last decade have resulted in enterprise data being spread across completely disparate networks. And with this, the proliferation of mobile devices, the influx of IoT, BYOD adoption, cloud migration, and the consumerization of IT, have transformed the security landscape. This has increased the attack surface and introduced new threat factors leading to massive data breaches.






read more
Categories Latest Research Solution
Leveraging Network Access Control to Unify Secure Access in Hybrid IT

Leveraging Network Access Control to Unify Secure Access in Hybrid IT

Network Access Control (NAC) solutions are widely deployed to secure an organization’s enterprise network from threats inside the network.  Most NAC solutions work by enforcing security policies on users and devices that attempt to access on-premise resources.  Digital transformation has blurred network perimeters and changed the way users work, creating numerous challenges for organizations as they strive to both simplify access and ensure security of their valuable assets on-premises and in the cloud.    






read more
Categories Latest Product Research Solution