Building PoPs for Secure Access Service Edge

The IT landscape has changed. Networks centralized around a data centre no longer make sense when applications are served from the cloud and users are working from remote locations. The internet has become a staple of enterprise networks but brings along security concerns that can no longer be solved with on-premise security appliances. Secure access

Solving the Challenges of Cloud Migration

Many of us can list a handful of examples where companies had high levels of market penetration, profitability, and a competitive moat that seemed impenetrable…only to end up failing due to lack of innovation. Kodak, Blockbuster, Blackberry are all examples of organizations that failed to follow modern technology and remain relevant.

Latest Release Notes – Enhanced Alerting

With our latest release of the Trustgrid Portal, we’ve added enhanced alerting and monitoring capabilities to nodes. Trustgrid’s existing alerting features enabled our customers to monitor node life cycle information including – connections (up/down), profile updates (config changes), and health checks (health of remote hosts).

Local Data, Centralized Application.

Trustgrid enables cloud applications to integrate to localized data with low latency and high availability. SaaS providers connect to remote data sets over the Trustgrid network and can route data directly to local users without that data leaving the country.

SD-WAN vs Trustgrid- Part 1

The team at Trustgrid often laments the lack of innovation in WAN technologies. Many are quick to point to SD-WAN as an example of innovation, and they’re right. SD-WAN is pretty cool but it’s target market is very limited.

Prevent Breaches with Micro Segmentation

VMware’s NSX is a datacenter SDN product that is spear heading the “micro segmentation” architecture. Segmenting the networks by application or service reduces the attack surface to the individual application or service exposed. It implicitly denies all other traffic in that segment.

The End of Network Access Control (NAC)

The rise of cloud and the growing “zero trust”  movement have left NACs out in the cold. Today’s Network Access Control were built for authentication and authorization in a trusted, local network or over a centralized WAN- concepts that have proven cumbersome, prone to breach, and expensive.