I recently had the pleasure to sit down with Pulse Secure CEO, Sudhakar Ramakrishna to discuss the current trends and key practices around achieving secure access, remote productivity, and moving to a Zero Trust model. Beginning back in March, organizations around the...
Read MoreAnalyst Perspective Evaluating Software Defined Perimeter Solutions for Hybrid IT Supporting business needs while enforcing security policies Part 2 of 2, Read Part 1 of the blog here. This week we continue the conversation with Jon Oltsik, Sr. Principal Analyst from...
Read MoreWe appreciate researchers, institutions, and media informing the public of vulnerabilities, risks, and the importance of patching susceptible systems. A recent article discussed a derivative exposure stemming from an old vulnerability (CVE-2019-11510) that was...
Read MoreAnalyst Perspective Evaluating Software Defined Perimeter Solutions for Hybrid IT Supporting business needs while enforcing security policies Part 1 of 2 The Secure Access market is quickly evolving to take advantage of multi-cloud and hybrid IT resources. With the...
Read MoreOur mission of “Secure Access for People, Devices, Things and Services” took a big step forward TODAY with the general availability of Pulse Zero Trust Access (PZTA) – the industry’s first hyper-converged, multi-tenant secure access service platform. During these...
Read MoreVPNs, or Virtual Private Networks, have been around for a long time. VPN may mean different things for different folks. A VPN may be the hub and spoke model that was augmented by other technologies from MPLS to SD-WAN. Hub and spoke VPNs still exist. When the concept...
Read More