by Juanita Koilpillai | Jan 11, 2021 | Blog Posts
At the risk of stating the obvious, the FireEye/Solar Winds attack personifies the increasing security vulnerability and risk posed by our continued reliance on aging, perimeter-centric network infrastructure. This attack, considered extremely serious, enabled access...
by Juanita Koilpillai | Dec 9, 2020 | Blog Posts
Over the last nine months, we’ve seen unprecedented growth in the number of corporate employees working away from the office. Many rely on VPNs for connectivity; IT Security and Network Ops trust the Virtual Private Networks with their cadre of external and internal...
by Juanita Koilpillai | Nov 24, 2020 | Blog Posts
It makes more sense when you understand the role of “Dynamic Enforcement” Last week I came across another article educating readers on the advent of Zero Trust architecture (ZTA) and how it represents a new paradigm for securing critical applications and data...
by Juanita Koilpillai | Nov 9, 2020 | Blog Posts
David Linthicum is an internationally recognized authority on cloud complexity and security. He regularly and accurately reports on trends and challenges faced by the enterprise as it attempts to tap into the economic and performance benefits of moving workloads to...
by Juanita Koilpillai | Oct 20, 2020 | Blog Posts
Have you been hearing about Software-Defined Perimeters (SDP) and wondering what all the fuss is about? Are you reading about Zero Trust as the next great security paradigm but wondering if any organization has successfully implemented a zero trust model? On October...
by Juanita Koilpillai | Oct 15, 2020 | Blog Posts
Zero Trust has entered the marketing lexicon. Companies are adding “zero trust” to their library of SEO terms giving you a sense that “everybody has one” – whatever that “one” might be. No one disputes the potential benefits of the zero trust message – deny-all,...
by Juanita Koilpillai | Oct 7, 2020 | Blog Posts
Zero Trust continues to be in the news and not for all the right reasons. A recent Deloitte survey with 600 respondents showed that the COVID-19 pandemic has motivated 37% more organizations to increase adoption of Zero Trust than were previously planning to earlier...
by Juanita Koilpillai | Sep 9, 2020 | Blog Posts
Containers alone are not the answer InfoWorld recently published an article by the renowned cloud expert David Linthicum. In the article Linthicum noted how the Covid pandemic and remote workforce is fueling cloud adoption and then clear described two cloud...
by Juanita Koilpillai | Aug 18, 2020 | Blog Posts
Software-defined perimeter architecture is key to security “Shifting Left” in CI/CD A recent article in Data Center Knowledge – What Containers and Kubernetes Mean for Colocation Data Centers – described how flexibility associated with...
by Juanita Koilpillai | Aug 11, 2020 | Blog Posts
Software-Defined Perimeter provides integrated security controls for ATO A recent GitLab white paper provides an elegant description of DevSecOps and how proactive security integration reduces an agency’s risk and vulnerabilities. It accurately outlines a solution...
by Juanita Koilpillai | Jul 13, 2020 | Blog Posts
Software Defined Perimeter architecture advances Zero Trust from a network-centric strategy to a truly secure solution for mission critical applications Gartner recently published a new Market Guide for Zero Trust Network Access (ZTNA) authored by Analysts Steve...
by Juanita Koilpillai | Jul 1, 2020 | Blog Posts
Software-Defined Perimeter provides integrated security controls for ATO As the proliferation of cloud computing, mobile device use, and the Internet of Things continues to dissolve traditional network boundaries, conventional network perimeters are no longer...
by Juanita Koilpillai | Jun 23, 2020 | Blog Posts
New DHS AccessID network built on SDP proofs IDs In 2019, OMB issued a new cybersecurity memorandum, M-19-17 – Enabling Mission Delivery through Improved Identity, Credential, and Access Management, setting forth a modernized policy for the federal government’s...
by Juanita Koilpillai | Apr 27, 2020 | Blog Posts
Zero Trust is a strategy. Software Defined Perimeter based on mTLS makes it a true solution Earlier this month there was another high visibility hack that involved malicious hijacking of more than 8,800 internet traffic routes from 200+ networks, and included the...
by Juanita Koilpillai | Apr 1, 2020 | Blog Posts
Agile ATO in the Spotlight The industry is grappling with conflicting network connection paradigms as the proliferation of cloud computing, mobile device use, and the Internet of Things has dissolved traditional network boundaries. Authentication of users...