Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Axis Security

Axis Security

"Five People That Should Make Up Your Modern Day ZTNA Tiger Team"

As a kid who grew up on a steady diet of network TV in the 80s, I always got excited when a crossover was teased at the end of an episode. Take the original Magnum PI starring Tom Selleck. There were several. Magnum and Hawaii Five-O… classic. Simon and Simon on the case with Higgins and Thomas Magnum in 1982, that was a good one! And who could not forget Jessica Fletcher (Angela Lansbury) using her detective skills in episode ‘Novel Connection’!

Axis Security

Why I Migrated from ZTNA 1.0 to Modern Day ZTNA

In 2017 Gartner unveiled a new acronym “ZTNA” short for zero trust network access, and released the Market Guide for Zero Trust Network Access. Revolutionary, especially compared to its incumbent technologies like VPN, ZTNA solution quickly became a new form of remote access that was designed to replace traditional remote access technologies and all the risks they came with.

Axis Security

The ZTNA Collection

Welcome to the ZTNA Collection, a curated list of the top favorite Zero Trust Network Access assets. Enjoy the array of glossary pages, blogs, videos, and whitepapers all specific to ZTNA thought leadership. What is Zero Trust Network Access (ZTNA)? Zero Trust Network Access (ZTNA) Created in April of 2019 by Gartner, the term Zero Trust Network Access (ZTNA) represents a set of new technologies designed for secure access to private applications.

Axis Security

ZTNA, It's Not Just a Remote Access Thing Anymore...

Over the past 28 months, two significant events happened which will change the way we build our IT networks. First, obviously, the pandemic. March 2020 caused the workers of the world to move their office cubes to their basements, bedrooms or even the family kitchen table. Remote work became essential for the economy to function. To facilitate access, we saw mass adoption of Zero Trust Network Access (ZTNA) technologies which do not require heritage based solutions like IPSec VPNs.

Axis Security

10 Things to Ask the ZTNA Vendor On Your Next Discovery Call That You Probably Never Knew to Ask

The term “ZTNA,” zero trust network access, has been around for years – first bursting onto the scene in 2017 when Gartner dropped the term in their ZTNA Market Guide. This solution quickly became the starting point for most zero trust projects in the industry since it helped solve a relatively simple, but critical problem – finding more secure ways of providing remote access to internal applications.

Things to Ask Your SSE Vendor: Episode 7: Minimizing Latency By Running On Multi-Cloud PoPs

Delivering the best user experience is everything in today’s modern workplace. The less latency the better. SSE vendors should have the ability for its different PoPS to run on multiple cloud providers. This will allow it to resolve user to application connections based on the least amount of latency. Atmos has the ability to support multi-PoPs resolutions. The platform automatically selects the fastest path, and POP (running on AWS, Oracle or Google), that is most high-performant based on the individual user and the specific application’s location. This is a magical capability, and a first in the SSE space.
Axis Security

Remove the Zero Trust onboard headache with this new domain discovery tool

In this new world of hybrid work where users, data, and applications are everywhere, there has been an increased reliance on web-based applications and for good reason. Web apps allow greater accessibility, flexibility, and scalability of resources for users requiring access from anywhere. While web applications are great, IT teams oftentimes encounter onboarding issues, specifically around discovering unidentified domains, and easily defining new policies for those discovered resources.