blog-banner.jpg

Security "Bits"

FPSL - Field Programmable SASE Logic

By Mike Schuricht  |  January 14, 2021 at 2:12 PM  | 

FPSL Field Programmable SASE Logic

When configuring a SASE platform to control traffic or data, the space of requirements is infinite. Basic capabilities can be configured via drop down menu options, regular expressions etc.  But what about complex logic involving IP addresses, cookies, form data, user ID, app instance, headers and beyond?

Read More

SASE vs Zero Trust

By Kevin Sheu  |  January 11, 2021 at 5:00 AM  | 
businessman hand working with modern technology and digital layer effect as business strategy concept-3

As we start the new year and see companies begin their plans and execution for “the new normal”, a topic of discussion from a past Customer Advisory meeting has become much more pronounced: what is the relationship between Zero Trust and Secure Access Service Edge (SASE)? Is one more relevant as security teams begin preparing for either a return to the office or an increasingly distributed environment?


Read More

A Vantage Point to See Threats Before Impact

By Kevin Sheu  |  August 12, 2020 at 5:00 AM  | 
Businesswoman holding tablet pc entering password. Security concept

We recently observed another near-compromise / near-breach event.

At a time when the focus has been on adversaries that develop increasingly complex and sophisticated attacks, tried and true techniques such as compromised credentials continue to be amongst the most potent weapons. According to Verizon’s annual DBIR Report, 80 percent of confirmed data breaches involved weak, default or stolen passwords; or brute force credential compromises.

Read More

SmartEdge is a Key Enabler for a Modern Remote Workforce

By Jonathan Andresen  |  July 6, 2020 at 5:00 AM  | 
Business woman working on tablet with secured cloud technology and network concept

To protect enterprise data, IT teams have to counter risks on two fronts: (a) insider risks, i.e. threats from within the organization, such as employees handling sensitive data and (b) outsider risks, i.e. those originating from malicious external sources.

Data loss prevention (DLP) capabilities within a CASB (Cloud Access Security Brokers) solution have emerged as the most effective platform to prevent legitimate remote users from accidentally or maliciously sharing business data that could put an organization at risk.  Providing visibility into all types of cloud-based applications (SaaS, IaaS and PaaS) running across all types of devices, both managed and unmanaged, is a prerequisite for securing business data against insider threats. Add-in real-time access control, and threat protection for managed apps, and IT has the full toolset needed to fast track cloud adoption while de-risking breaches caused by internal users.

Read More
FOLLOW US

BLOG TOPICS

see all