Cybersecurity company Trend Micro this week released updates to its Trend Vision One solution designed to meet the mass adoption of new AI tools by managing the risks associated with that adoption and securing how organizations use AI. In the company announcement, co-founder and CEO Eva Chen said, “Great advancements in technology always come with … continue reading
BackBox has introduced Zero Trust Network Operations (ZTNO). This capability is designed as a best practice framework consisting of six actionable pillars aimed at integrating cybersecurity considerations directly into the network layer for NetOps teams. To grow the adoption of ZTNO, BackBox has upgraded its Network Automation Platform, incorporating enhancements to the Privileged Access Manager, … continue reading
Buoyant, the company behind Linkerd, has introduced Linkerd Enterprise, a commercial distribution of Linkerd tailored for enterprise users. It enhances the open-source Linkerd with features specific to enterprise needs, such as zero trust and FIPS 140-2 compliance, a sophisticated cost-aware load balancer, automation for lifecycle management, and additional functionalities to support enterprise adoption. “Over the … continue reading
Cloudflare One for AI was released as a collection of features that help teams build with the latest AI services while maintaining a zero-trust security posture. “Cloudflare One’s goal is to allow you to safely use the tools you need, wherever they live, without compromising performance. These features will feel familiar to any existing use … continue reading
Dell Technologies today announced updates that have been made to its storage portfolio in order to increase cyber resiliency, energy efficiency, and automation. These updates are intended to assist users along their multicloud journeys. With this update, PowerStore, Dell’s all-flash data storage array, is increasing its security to help organizations adopt a Zero Trust model. … continue reading
It’s no secret that businesses and organizations are embracing cloud services, containers, and other innovations to boost business productivity, scale more efficiently, and better manage infrastructure costs. However, transitioning legacy environments to the cloud introduces new challenges around securing dynamic and ephemeral cloud infrastructure. How can organizations unlock the full potential of the cloud without … continue reading
Dell announced new services for Microsoft products that focus on zero trust, including Identity and Endpoint Protection with Microsoft Zero Trust. The new capability aims to help companies achieve zero trust alignment by providing expert guidance, implementation services, adoption and change management strategies. It provides assessments of Active Directory and Azure Active Directory and offers … continue reading
The number of organizations that have some sort of Zero Trust initiative in place has more than doubled in the last year. This finding comes from the security company, Okta, which has announced the results of its fourth annual State of Zero Trust Security Report. The survey looked at 700 security leaders and revealed that … continue reading
The newly released Citrix Secure Private Access is a cloud-delivered, zero-trust network access offering that allows companies to provide employees access to apps and data that they need, from a variety of device types. “The IT pendulum has been swinging toward flexible work models for years, and the pandemic has accelerated the velocity,” said John … continue reading
The potential for cyberattacks has placed many organizations beyond Ukraine on high alert for any threats, and has left them wondering what they can do to bolster their security posture. “Unlike traditional warfare, which generally only has impacts in and around a specific conflict zone, cyberattacks can have far-reaching impacts beyond the initial target that … continue reading
The automated SaaS security company DoControl announced no-code security workflows that brings Zero Trust into the SaaS data layer. DoControl’s security workflows allow for consistent, granular, and customizable data access controls, which helps to close the gaps found in inflexible hard-coded and out-of-the-box policies. “Security teams are becoming increasingly frustrated with the lack of visibility … continue reading
IBM expanded its zero trust strategy with new Secure Access Service Edge (SASE) services to help modernize network security. SASE is a new architecture model designed to address the requirements of organizations that are digitally transforming, adopting cloud and SaaS applications, and providing services to a hybrid workforce and customer base. The new service leverages … continue reading