Topic: zero trust

Dell expands zero trust offerings with identity and endpoint protection

Dell announced new services for Microsoft products that focus on zero trust, including Identity and Endpoint Protection with Microsoft Zero Trust.  The new capability aims to help companies achieve zero trust alignment by providing expert guidance, implementation services, adoption and change management strategies.  It provides assessments of Active Directory and Azure Active Directory and offers … continue reading

Report: Over half of organizations have a Zero Trust Initiative in place

The number of organizations that have some sort of Zero Trust initiative in place has more than doubled in the last year. This finding comes from the security company, Okta, which has announced the results of its fourth annual State of Zero Trust Security Report. The survey looked at 700 security leaders and revealed that … continue reading

Citrix Secure Private Access released to support flexible work models

The newly released Citrix Secure Private Access is a cloud-delivered, zero-trust network access offering that allows companies to provide employees access to apps and data that they need, from a variety of device types.  “The IT pendulum has been swinging toward flexible work models for years, and the pandemic has accelerated the velocity,” said John … continue reading

No one is cyber-secure in a cyberwar

The potential for cyberattacks has placed many organizations beyond Ukraine on high alert for any threats, and has left them wondering what they can do to bolster their security posture.  “Unlike traditional warfare, which generally only has impacts in and around a specific conflict zone, cyberattacks can have far-reaching impacts beyond the initial target that … continue reading

DoControl announces no-code security workflows for SaaS applications

The automated SaaS security company DoControl announced no-code security workflows that brings Zero Trust into the SaaS data layer. DoControl’s security workflows allow for consistent, granular, and customizable data access controls, which helps to close the gaps found in inflexible hard-coded and out-of-the-box policies. “Security teams are becoming increasingly frustrated with the lack of visibility … continue reading

IBM expands zero trust strategy

IBM expanded its zero trust strategy with new Secure Access Service Edge (SASE) services to help modernize network security.  SASE is a new architecture model designed to address the requirements of organizations that are digitally transforming, adopting cloud and SaaS applications, and providing services to a hybrid workforce and customer base.  The new service leverages … continue reading

DH2i launches free DxEnterprise & DxOdyssey Developer Editions

DH2i announced the launch of developer editions of its DxEnterprise and DxOdyssey software, which offer free licenses for non-production use and trials.  DxEnterprise enables users to manage and ensure high availability (HA) for a variety of workloads such as SQL Server at the instance level and also SQL Server availability groups inside or outside containers.  … continue reading

Zero Trust is crucial for secure remote work

Microsoft believes companies should be utilizing Zero Trust in order to keep their systems secure. Zero Trust is a security model in which a company always assumes there is a breach and provides the least privileged access necessary.  Remote work, and now hybrid work, have shown the need for employees to securely access applications from … continue reading

Google announces BeyondCorp Enterprise, its new zero trust product offering

Google announced the release of BeyondCorp Enterprise which extends and replaces BeyondCorp Remote Access for companies to start their own zero-trust implementation.  The solution includes non-disruptive, agentless support through the Chrome Browser, access to Google’s global network, and the entire surface area is protected by Google’s scalable DDoS protection service, which has been proven to … continue reading

ITOps Times news digest: Aqua Security 4.2, Gravitational’s Teleport, and DH2i’s DxConnect

Aqua Security has announced the release of version 4.2 of its platform. This release introduces Vulnerability Shield, which is an automated vulnerability and component analysis tool. Vulnerability Shield can generate policies that will detect and block access to vulnerable components. Aqua 4.2 also includes advanced protection for serverless functions, container image scanning by layer, a … continue reading

DMCA.com Protection Status

Get access to this and other exclusive articles for FREE!

There's no charge and it only takes a few seconds.

Sign up now!