The Emergence of Extranet-as-a-Service

For decades extranets have connected enterprises to customers, vendors, and contractors. They have been built using traditional networking gear stretched to accommodate the unique security, networking, and deployment requirements of connecting between enterprise networking perimeters. An extranet is a logical network zone meant to connect multiple parties under different admin domains across a range of

Modernize SaaS with Edge Containerization

Contrary to the prophecies of many cloud absolutists, hybrid environments continue to power SaaS operations worldwide. Hybrid environments are a blend of cloud and on-premise services that are operated and supported as a single environment. Today, much enterprise data resides and is generated on-premises, in customer environments, and even in remote IoT systems. Edge computing

Connect SaaS to Customer Data

Network-as-a-Service is the easiest way to connect SaaS to customer data sources Delivering a SaaS application from the cloud requires a rethinking of tech, team, and processes. When committing to a public cloud, staffing for new DevOps commitments, and handling new support responsibilities, it’s important to make informed decisions. But there are also less obvious

How Secure Are Application Networks?

Application networks enhance security when connecting centralized apps to multiple organizations. As modern software architectures become more distributed, application networks have emerged as a way to seamlessly connect applications, data and devices residing in multiple locations. An effective application network creates a layer of connectivity that mitigates the complexities of connecting, managing, and supporting an

Cloud and the Complexity of Distributed Applications

We are in the business of helping software providers with tools that make them more secure and efficient. In those conversations, we get exposed to the infinite number of ways that companies architect, develop, and support their application’s infrastructure. We’ve also discovered that the complexity of distributed applications is a significant challenge. While the architecture

The VPN Security Gap

This time, it’s our friends at Fortinet who have been compromised. Half a million credentials were swiped from VPN routers. Once again, the vendor had issued a patch, but many customers had not updated their systems, highlighting the importance of VPN security measures to protect against such attacks. By now we all understand that there