The IT landscape has changed. Networks centralized around a data centre no longer make sense when applications are served from the cloud and users are working from remote locations. The internet has become a staple of enterprise networks but brings along security concerns that can no longer be solved with on-premise security appliances. Secure access
SASE and the Electric Vehicle Revolution
When electric cars first began gaining popularity, traditional car companies thought they could easily replicate them and didn’t devote much time to develop a competing product. You could argue some still have their head in the sand, but we’ll reserve that topic for another blog. What the traditional car companies were reluctant to realize was
Benefits of Integrating Identity and Network Access for Security and Compliance
The term “identity-based networking” refers to the concept of an end user’s identity being tied to the network services they are allowed to receive for Security and Compliance. The initial implementations of this concept can be seen in ubiquitous network services such as 802.1x. Wireless networks have been applying the basics of identity-based networking to
SD-WAN, SDP, ZTNA… Are They Really That Different?
The Similarities between Different Networking Solutions Confused by the ‘buzz-word bingo’ in today’s WAN networking products? You should be. Every vendor from basic VPN to advanced global CDNs is rebranding across a variety of networking categories. The real secret is – when these solutions become more product than promises, there is not much difference between
Predict the Future of SASE With an Eye to the Past
It was not that long ago that a wide variety of security and networking technologies first erupted in the market. Firewalls, anti-virus, IDS/IPS, web content management, site-to-site and user VPNs were offered by dozens of different vendors on dedicated appliances without a thought to centralized management or product integration. From this chaos came the next
Cloud, Mobility and the Rise of SASE
The rise of SASE (Secure Access Service Edge) is transforming the way networking and security are delivered, eliminating the challenges of managing today’s distributed environments. SASE integrates SD-WAN, zero-trust remote user access, and cloud-delivered security, allowing for security solutions to be delivered from any location and managed from the cloud. This approach simplifies infrastructure by
The Path to Victory in the SASE Market
The victor in the evolving SASE market will deliver the highest quality user experience by solving the security service chaining problem while competing head-on with the legacy security solutions that dominate IT security spending today. They will build their solution on a platform that integrates software-defined networking, edge computing, and solves the expensive problems of
Zero Trust and the Software-Defined Perimeter
The workplace has never been more exposed to security risk than it is today. Even before staff was forced to work from home, employees were on the road, accessing diverse applications from planes, hotel rooms, and coffee shops. To ensure productivity and business continuity, IT teams have been tasked with ensuring that these applications are
WireGuard for the Enterprise
For those who follow all things networking, or keep tabs on the evolution of Linux, the word WireGuard can elicit feelings of excitement and curiosity. For those who don’t geek out on such things, you may not be as familiar with the word. Wireguard is a new approach to VPN technology. After years of frustration
Lowering the Cost of Connectivity
This blog provides an overview of our upcoming webinar, Lowering the Cost of Connectivity: Increasing the ROI of Cloud Applications. Trustgrid’s Chief Product Officer, Joe Gleinser, will guide participants through the problems, solutions and implementation process of secure cloud to on-premise connectivity and its cost-saving implications. The cloud is changing IT infrastructure, allowing application providers
The 4 Biggest Misconceptions About MPLS
Every day we speak with companies looking for ways to improve the cost and performance of their application’s connectivity. When the topic of MPLS comes up, there is a predictable groan of resigned disappointment. No one is coming to its defence. How can a technology that is so widely used, be so uniformly disliked? Typically,
Unpatched VPNs Present Existential Risk
Recently, Finastra was hit with ransomware attacks and was forced to shut down a number of its products and services over the weekend. According to initial reports, the attacks may have been facilitated by the use of unpatched VPNs with known vulnerability issues. While Finastra has not released the full details and scope of the breach,