Removing Cloud Limitations

Let’s start with a paradox – The potential of the cloud is limitless BUT the cloud is currently being limited. What the public cloud providers have built is a marvel of modern technology. Millions of coordinated systems running across dozens of regions not only provides the massive amounts of computing and storage needed to power

A Networking or Application Platform?

A service mesh is a software infrastructure that facilitates communications between microservices. It is used to control how different parts of a distributed application integrate with each other. This disassembles monolithic application architectures by allowing applications to be broken down into a collection of services that can be built, maintained, and improved independently of the

What is WAN Edge Infrastructure?

As Gartner defines it, WAN Edge Infrastructure is a class of networking technology that provides connectivity to distributed IT resources. Whether those resources are in data centers, public clouds or delivered as SaaS applications, connectivity is delivered through a combination of hardware and software that works to provide reliability and security to the network. What

ZTNA for Banking

While many are familiar with the advantages and challenges of VPN for remote user access, many are less familiar with Zero Trust network access (ZTNA). For those who don’t know, ZTNA is the next-generation VPN solution designed for high security and compliance organizations that require high productivity from remote staff.  Because of its security and

Securing a Remote Workforce in Banking

Banks and credit unions have one of the toughest security jobs in the world. They must balance the needs of handling some of the most important data in the world (financial records and transactions) with the need to facilitate seamless access to this data for their customers and staff.  As the events of 2020 unfolded

Zero Trust Puts On Its CAEP

No one in the world of enterprise security is denying the super powers of Zero Trust. More secure, more flexible, able to leap tall buildings in a single bound…. Ok, I got wires crossed on that last one, but the point is that regardless of who you talk to, most everyone agrees that Zero Trust

Identity is the Heart of SASE

SASE architectures allow IT to deliver networking and security to all locations, applications and users. This happens through tight integration of networking and security delivered through a single cloud platform. But one of the fundamental elements of SASE is its identity-based policy framework. The identity of users, groups, and devices is the foundation of how