Waverley Labs Blog
NEW NORMAL – Identity is the New Perimeter
One thing we can all agree on: more computing assets reside outside enterprise infrastructure. While executives come to terms with the fact that cybersecurity risk is increasing, these computing assets are beyond legacy security controls. Adapting to change and...
Software Defined Perimeter – the Controller plays a role but the Gateway is the bomb!
If you follow this blog, you may have noticed that I am extremely passionate about Software Defined Perimeters (SDP). As someone who pioneered the first open source reference architecture and specifications of SDP for the Cloud Security Alliance (CSA), I’ve seen the...
Not all SDPs are Created Equal
Behold … the Trust Zone! Zero Trust is the new buzzword – but is every Zero Trust strategy supported by an effective and efficient model to deliver on the promise? There are many factors to consider and one is the role of a software-defined perimeter (SDP). If...
Shift to Remote Work and Increasing Attacks Fueling Demand for the Software-Defined Perimeter
According to Gartner, spending on network security equipment decreased 12.6% from 2019 to 2020 as cloud-based security solutions increased to facilitate remote work. At the same time, the pandemic and massive increase in cloud spending are resulting in an...
The (Network) Perimeter is Dead – Long Live the Software-Defined Perimeter
At the risk of stating the obvious, the FireEye/Solar Winds attack personifies the increasing security vulnerability and risk posed by our continued reliance on aging, perimeter-centric network infrastructure. This attack, considered extremely serious, enabled access...
Think of SDP as a Private Application VPN
Over the last nine months, we’ve seen unprecedented growth in the number of corporate employees working away from the office. Many rely on VPNs for connectivity; IT Security and Network Ops trust the Virtual Private Networks with their cadre of external and internal...
Zero Trust and the Software Defined Perimeter
It makes more sense when you understand the role of “Dynamic Enforcement” Last week I came across another article educating readers on the advent of Zero Trust architecture (ZTA) and how it represents a new paradigm for securing critical applications and data -...
Software Defined Perimeter – The Wizard Behind the Zero Trust Curtain
David Linthicum is an internationally recognized authority on cloud complexity and security. He regularly and accurately reports on trends and challenges faced by the enterprise as it attempts to tap into the economic and performance benefits of moving workloads to...
Software-Defined Perimeter – Trick or Treat?
Have you been hearing about Software-Defined Perimeters (SDP) and wondering what all the fuss is about? Are you reading about Zero Trust as the next great security paradigm but wondering if any organization has successfully implemented a zero trust model? On October...
The Nuances of a True SDP Solution and its Relationship with Zero Trust
Zero Trust has entered the marketing lexicon. Companies are adding “zero trust” to their library of SEO terms giving you a sense that “everybody has one” – whatever that “one” might be. No one disputes the potential benefits of the zero trust message - deny-all,...