Based on blockchain technology, LogSentinel designs and implements a zero-trust security system that stores data on-chain, uploads local log files to the blockchain for storage, and provides a visual interface for users to use security analysis functions. The system can provide safe and reliable storage of security device logs and at the same time provide convenience for log analysis and log forensics. LogSentinel solves the problems associated with easy-to-delete, tamper, and falsifying log files.
Keeper security is zero trust. Our cybersecurity platform enables organizations to achieve full visibility, security and control across your data environment. By unifying Enterprise Password Management (EPM), Secrets Management (SM) and Privileged Connection Management (PCM), Keeper provides organizations with a single, pervasive pane of glass to track, log, monitor and secure every user, on every device, from every location, as they transact with all permitted sites, systems and applications.
As manufacturers dash headlong into smart factory initiatives, the number of IoT devices operating in factories, warehouses, and across supply chain infrastructure is exploding. Manufacturers seek to utilize IoT in a range of places, be it video camera inspection devices on the assembly line, temperature sensors on refrigeration units, or maintenance telemetry sensors on factory equipment.
Trust should be earned, yet, too often, we place our trust blindly. Software is one such example. Attacks like SolarWinds, and the vulnerability discovered in the Log4j open source library should serve as the wake-up call for developers that the software supply chain is vulnerable. There are too many players in the open source supply chain, which has become increasingly interconnected and complex, and attackers are scarily good at finding openings in the nooks and crannies. Zero trust says no more.
This blog was jointly written with Kumar Ramachandran, Senior Vice President, Palo Alto Networks Most people can recall a time when computers were pieces of equipment that remained in a fixed location. Because of this, security was less of an issue outside of an organization's own walls. That all changed when laptop computers and mobile devices ushered in the era of the mobile workforce.
Machine Identities, Zero Trust….how do these relate to your IoT project? Today’s PKI vendors have specific solutions for managing non-human identities – machines – like servers, laptops, software applications, API’s and other assets found within a corporate network.
In 2017 Gartner unveiled a new acronym “ZTNA” short for zero trust network access, and released the Market Guide for Zero Trust Network Access. Revolutionary, especially compared to its incumbent technologies like VPN, ZTNA solution quickly became a new form of remote access that was designed to replace traditional remote access technologies and all the risks they came with.
As a kid who grew up on a steady diet of network TV in the 80s, I always got excited when a crossover was teased at the end of an episode. Take the original Magnum PI starring Tom Selleck. There were several. Magnum and Hawaii Five-O… classic. Simon and Simon on the case with Higgins and Thomas Magnum in 1982, that was a good one! And who could not forget Jessica Fletcher (Angela Lansbury) using her detective skills in episode ‘Novel Connection’!