The term “identity-based networking” refers to the concept of an end user’s identity being tied to the network services they are allowed to receive. The initial implementations of this concept can be seen in ubiquitous network services such as 802.1x. Wireless networks have been applying the basics of identity-based networking to users who joined wireless
It was not that long ago that a wide variety of security and networking technologies first erupted in the market. Firewalls, anti-virus, IDS/IPS, web content management, site-to-site and user VPNs were offered by dozens of different vendors on dedicated appliances without a thought to centralized management or product integration. From this chaos came the next
The adoption of cloud technologies and an increase in user mobility are driving fundamental changes to IT infrastructure. These changes will result in a seamless work environment for end users and increased productivity across every facet of enterprise organizations. Meanwhile, the components needed to secure and connect the modern business have never been more disconnected.
The victor in the evolving SASE market will deliver the highest quality user experience by solving the security service chaining problem while competing head-on with the legacy security solutions that dominate IT security spending today. They will build their solution on a platform that integrates software-defined networking, edge computing, and solves the expensive problems of
The workplace has never been more exposed to security risk than it is today. Even before staff was forced to work from home, employees were on the road, accessing diverse applications from planes, hotel rooms, and coffee shops. To ensure productivity and business continuity, IT teams have been tasked with ensuring that these applications are
For those who follow all things networking, or keep tabs on the evolution of Linux, the word WireGuard can elicit feelings of excitement and curiosity. For those who don’t geek out on such things, you may not be as familiar with the word. Wireguard is a new approach to VPN technology. After years of frustration
Everyday we speak with companies looking for ways to improve the cost and performance of their application’s connectivity. When the topic of MPLS comes up, there is a predictable groan of resigned disappointment. No one is coming to its defense. How can a technology that is so widely used, be so uniformly disliked? Normally, technologies
As you may have heard, Finastra was hit with ransom-ware attacks and were forced to shut down a number of their products and services over the weekend. There are initial reports showing that Finastra may have been running an unpatched VPN with known vulnerability issues. While Finastra has not released the full details and scope
A Data Mesh creates a layer of connectivity that abstracts away the complexities of connecting, managing and supporting an application’s access to remote data. It is used to stitch together data held across multiple environments. The premise of a data mesh is that it uses software to connect environments no matter where it lives, or
In boxing, the tale of the tape is a term that refers to the measurements taken before a fight begins. It is used to ‘size up’ the competitors by things like their weight, reach and height. While not an exact science, these stats give viewers a sense of who may be dominant in a fight.
As Michael Vizard notes here, virtualization of network features helps automate the onerous and often changing tasks of compliance. Legacy systems demand massive amounts of labor or expensive toolsets (or both) to achieve even baseline compliance.
Connectivity solutions will be increasingly challenged to implement the most advanced security. Enterprise scale banks can produce enterprise scale APIs but community financial institutions must rely on different methods, frequently to several vendors at a time.