SASE and the Electric Vehicle Revolution

When electric cars first began gaining popularity, traditional car companies thought they could easily replicate them and didn’t devote much time to develop a competing product. You could argue some still have their head in the sand, but we’ll reserve that topic for another blog.  What the traditional car companies were reluctant to realize was

Predict the Future of SASE With an Eye to the Past

It was not that long ago that a wide variety of security and networking technologies first erupted in the market. Firewalls, anti-virus, IDS/IPS, web content management, site-to-site and user VPNs were offered by dozens of different vendors on dedicated appliances without a thought to centralized management or product integration. From this chaos came the next

Cloud, Mobility and the Rise of SASE

The rise of SASE (Secure Access Service Edge) is transforming the way networking and security are delivered, eliminating the challenges of managing today’s distributed environments. SASE integrates SD-WAN, zero-trust remote user access, and cloud-delivered security, allowing for security solutions to be delivered from any location and managed from the cloud. This approach simplifies infrastructure by

The Path to Victory in the SASE Market

The victor in the evolving SASE market will deliver the highest quality user experience by solving the security service chaining problem while competing head-on with the legacy security solutions that dominate IT security spending today. They will build their solution on a platform that integrates software-defined networking, edge computing, and solves the expensive problems of

WireGuard for the Enterprise

For those who follow all things networking, or keep tabs on the evolution of Linux, the word WireGuard can elicit feelings of excitement and curiosity. For those who don’t geek out on such things, you may not be as familiar with the word. Wireguard is a new approach to VPN technology. After years of frustration

The 4 Biggest Misconceptions About MPLS

Every day we speak with companies looking for ways to improve the cost and performance of their application’s connectivity. When the topic of MPLS comes up, there is a predictable groan of resigned disappointment. No one is coming to its defence. How can a technology that is so widely used, be so uniformly disliked? Typically,

Unpatched VPNs Present Existential Risk

Recently, Finastra was hit with ransomware attacks and was forced to shut down a number of its products and services over the weekend. According to initial reports, the attacks may have been facilitated by the use of unpatched VPNs with known vulnerability issues. While Finastra has not released the full details and scope of the breach,

Is a Data Mesh secure?

A Data Mesh creates a layer of connectivity that abstracts away the complexities of connecting, managing and supporting an application’s access to remote data. It is used to stitch together data held across multiple environments. The premise of it is that it uses software to connect environments no matter where it lives, or who controls

Trustgrid’s Tale of the Tape

In boxing, the tale of the tape is a term that refers to the measurements taken before a fight begins. It is used to ‘size up’ the competitors by things like their weight, reach and height. While not an exact science, these stats give viewers a sense of who may be dominant in a fight.