When electric cars first began gaining popularity, traditional car companies thought they could easily replicate them and didn’t devote much time to develop a competing product. You could argue some still have their head in the sand, but we’ll reserve that topic for another blog. What the traditional car companies were reluctant to realize was
Benefits of Integrating Identity and Network Access for Security and Compliance
The term “identity-based networking” refers to the concept of an end user’s identity being tied to the network services they are allowed to receive for Security and Compliance. The initial implementations of this concept can be seen in ubiquitous network services such as 802.1x. Wireless networks have been applying the basics of identity-based networking to
Predict the Future of SASE With an Eye to the Past
It was not that long ago that a wide variety of security and networking technologies first erupted in the market. Firewalls, anti-virus, IDS/IPS, web content management, site-to-site and user VPNs were offered by dozens of different vendors on dedicated appliances without a thought to centralized management or product integration. From this chaos came the next
Cloud, Mobility and the Rise of SASE
The rise of SASE (Secure Access Service Edge) is transforming the way networking and security are delivered, eliminating the challenges of managing today’s distributed environments. SASE integrates SD-WAN, zero-trust remote user access, and cloud-delivered security, allowing for security solutions to be delivered from any location and managed from the cloud. This approach simplifies infrastructure by
The Path to Victory in the SASE Market
The victor in the evolving SASE market will deliver the highest quality user experience by solving the security service chaining problem while competing head-on with the legacy security solutions that dominate IT security spending today. They will build their solution on a platform that integrates software-defined networking, edge computing, and solves the expensive problems of
Zero Trust and the Software-Defined Perimeter
The workplace has never been more exposed to security risk than it is today. Even before staff was forced to work from home, employees were on the road, accessing diverse applications from planes, hotel rooms, and coffee shops. To ensure productivity and business continuity, IT teams have been tasked with ensuring that these applications are
WireGuard for the Enterprise
For those who follow all things networking, or keep tabs on the evolution of Linux, the word WireGuard can elicit feelings of excitement and curiosity. For those who don’t geek out on such things, you may not be as familiar with the word. Wireguard is a new approach to VPN technology. After years of frustration
The 4 Biggest Misconceptions About MPLS
Every day we speak with companies looking for ways to improve the cost and performance of their application’s connectivity. When the topic of MPLS comes up, there is a predictable groan of resigned disappointment. No one is coming to its defence. How can a technology that is so widely used, be so uniformly disliked? Typically,
Unpatched VPNs Present Existential Risk
Recently, Finastra was hit with ransomware attacks and was forced to shut down a number of its products and services over the weekend. According to initial reports, the attacks may have been facilitated by the use of unpatched VPNs with known vulnerability issues. While Finastra has not released the full details and scope of the breach,
Is a Data Mesh secure?
A Data Mesh creates a layer of connectivity that abstracts away the complexities of connecting, managing and supporting an application’s access to remote data. It is used to stitch together data held across multiple environments. The premise of it is that it uses software to connect environments no matter where it lives, or who controls
Trustgrid’s Tale of the Tape
In boxing, the tale of the tape is a term that refers to the measurements taken before a fight begins. It is used to ‘size up’ the competitors by things like their weight, reach and height. While not an exact science, these stats give viewers a sense of who may be dominant in a fight.
SDN’s role in automating compliance requirements
As Michael Vizard notes here, virtualization of network features helps automate the onerous and often changing tasks of compliance. Legacy systems demand massive amounts of labor or expensive toolsets (or both) to achieve even baseline compliance.