Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Access Management

6 Questions IT Leaders Are Asking About Zero Trust Network Access (ZTNA)

Given the need to support hybrid work, Gartner heavily recommends that IT leaders consider a Security Service Edge (SSE) platform for the practical implementation of a zero trust strategy. An SSE platform largely incorporates these main technologies into a single offering: ZTNA, SWG, and CASB. Gartner recommends that SSE implementation should begin by prioritizing high areas of risk by replacing remote access VPN with a modern ZTNA solution.

The Security Service Edge: EXPLAINED

Security service edge (SSE) will be one of the most talked about subjects in 2022, and beyond. The problem is not many IT leaders understand what SSE is, how it differs from SASE, what to look for when selecting one, or the value they provide for the business. In the video below I demystify SSE. Enjoy. If you are interested in learning more about SSE feel free to speak with our team here at Axis! We’d be happy to provide a quick demo of our SSE platform

3 Tips to Avoid Roadblocks on Your Journey to Securing the Modern Workplace

I was on the call with a potential customer and heard the following, “Our last try at implementing Zero Trust Networking (ZTNA) utterly failed. We purchased the solution from vendor X, deployed it but didn’t account for the network team. Since the solution did not account for their network diagnostic tools (ping and traceroute), they are refusing to support us.

6 Network Authentication Methods to Prevent a Data Breach

Cybercriminals are continuously finding new ways to steal sensitive information. Having robust network security measures in place is now more important than ever — and network authentication is part of the solution. There are various authentication technologies available that can add an extra layer of protection to prevent security lapses, and each one offers a unique solution. This post will highlight the most common methods for network authentication and answer the following questions.

The Role of Zero Trust in Enabling Hybrid Work

Zero Trust…it’s probably one of the biggest IT buzzwords in the last decade. While it seems that every vendor claims to be an enforcer of zero trust, there is value behind the concept if you can cut through the marketing haze. One of the greatest areas of value is around enabling hybrid work for employees. Remote work and hybrid work have extended the corporate world to every home, and user device. The workforce must access wherever they are, from whatever device is in front of them.

Key trends from 2021 that redefined IAM

With 2022 around the corner, many want to hit the ground running and make the new year different from the last. If you’ve also been preparing for a productive year and scaling your organization up, this blog will bring you up to speed on the major security trends of 2021 you should know about. With ADManager Plus, you can easily adapt to these new trends and be ready to take on any IAM challenge in 2022. For now, here are the major IAM trends of 2021.

Over-Privileged Service Accounts Create Escalation of Privileges and Lateral Movement in Google Cloud

In this blog, we’ve analyzed data from Netskope customers that include security settings of over 1 million entities in 156,737 Google Cloud (GCP) projects across hundreds of organizations (see Dataset and Methodology for more details on the dataset). We will specifically look at the configuration of service accounts, see what’s commonly occurring in the real world, and analyze how multiple security misconfigurations can lead to escalation of privileges and lateral movement.