Waverley Labs Blog

NEW NORMAL – Identity is the New Perimeter

One thing we can all agree on: more computing assets reside outside enterprise infrastructure. While executives come to terms with the fact that cybersecurity risk is increasing, these computing assets are beyond legacy security controls. Adapting to change and...

read more

Not all SDPs are Created Equal

Behold … the Trust Zone!   Zero Trust is the new buzzword – but is every Zero Trust strategy supported by an effective and efficient model to deliver on the promise? There are many factors to consider and one is the role of a software-defined perimeter (SDP). If...

read more

Think of SDP as a Private Application VPN

Over the last nine months, we’ve seen unprecedented growth in the number of corporate employees working away from the office. Many rely on VPNs for connectivity; IT Security and Network Ops trust the Virtual Private Networks with their cadre of external and internal...

read more

Zero Trust and the Software Defined Perimeter

It makes more sense when you understand the role of “Dynamic Enforcement”   Last week I came across another article educating readers on the advent of Zero Trust architecture (ZTA) and how it represents a new paradigm for securing critical applications and data -...

read more