Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Zero Trust

Spotlight on Zero Trust: We're fastest and here's the proof

In January and in March we posted blogs outlining how Cloudflare performed against others in Zero Trust. The conclusion in both cases was that Cloudflare was faster than Zscaler and Netskope in a variety of Zero Trust scenarios. For Speed Week, we’re bringing back these tests and upping the ante: we’re testing more providers against more public Internet endpoints in more regions than we have in the past.

How MSPs Can Overcome Common Zero Trust Obstacles

Zero trust is not a new cybersecurity concept, yet it seems everywhere lately. In case you’re unfamiliar with zero trust, it is defined as an approach to security that assumes no implicit trust between users, devices, or networks as a baseline, and once a user has been verified as legitimate, authorized, and trustworthy, access is allowed. Zero trust has been so effective as a cybersecurity strategy that the U.S.

Understanding AI risks and how to secure using Zero Trust

AI’s transformative power is reshaping business operations across numerous industries. Through Robotic Process Automation (RPA), AI is liberating human resources from the shackles of repetitive, rule-based tasks and directing their focus towards strategic, complex operations. Furthermore, AI and machine learning algorithms can decipher the huge sets of data at an unprecedented speed and accuracy, giving businesses insights that were once out of reach.

Case study: Calico enables zero-trust security and policy automation at scale in a multi-cluster environment for Box

Box is a content cloud that helps organizations securely manage their entire content lifecycle from anywhere in the world, powering over 67% of Fortune 500 businesses. As a cloud-first SaaS, the company provides customers with an all-in-one content solution within a highly secure infrastructure, where organizations can work on any content, from projects and contracts to Federal Risk and Authorization Management Program (FedRAMP)-related content.

Zero Trust: The Case for Just-in-Time Access

Traditional IT security models focused on one thing: keeping the bad guys out the network. Anyone inside the network was physically in the corporate office and logged on to a machine set up and managed by the IT team, so they were trusted implicitly. That model no longer works. Today’s world of cloud resources, remote workers and user-owned devices has blurred if not entirely erased the notion of a network perimeter that could be defended.

Top tips: Principles for building a strong Zero Trust architecture

It’s safe to say that we are at a juncture where Zero Trust architecture is being heralded as the gold standard when it comes to cybersecurity. This architecture gives top priority to user behavior and assets as the primary line of defense from cyber threats. Even though the vast majority of companies worldwide have adopted Zero Trust, only 1% actually meet the requirements.

5 Guiding Principles to protect your IP effectively with Zero Trust

Zero Trust is the new Buzz word in the cybersecurity arena. Ever since, Forrester Analyst, Kindervag introduced the term Zero Trust in his article “Zero Trust Architecture”, traditional security measures have become obsolete. Zero Trust is a security framework that is based on an “I Trust No One” principle; it doesn’t matter if the user is within or outside the organization. A user is not granted access unless he/she is authenticated and authorized first.

Think Beyond SD-WAN to a Zero Trust, Context-Aware SD-WAN

The enterprise business is now borderless, where users, devices, sites, and clouds are all creating any-to-any connections with new access control requirements. Digital innovation has led to the proliferation of apps and IoT devices where the cloud and web have become an encyclopedia of applications.