Topic: zero trust

BackBox Introduces Zero Trust Network Operations

BackBox has introduced Zero Trust Network Operations (ZTNO). This capability is designed as a best practice framework consisting of six actionable pillars aimed at integrating cybersecurity considerations directly into the network layer for NetOps teams.  To grow the adoption of ZTNO, BackBox has upgraded its Network Automation Platform, incorporating enhancements to the Privileged Access Manager, … continue reading

Linkerd Enterprise launched as first enterprise-focused distribution of Linkerd Service Mesh Project

Buoyant, the company behind Linkerd, has introduced Linkerd Enterprise, a commercial distribution of Linkerd tailored for enterprise users.  It enhances the open-source Linkerd with features specific to enterprise needs, such as zero trust and FIPS 140-2 compliance, a sophisticated cost-aware load balancer, automation for lifecycle management, and additional functionalities to support enterprise adoption. “Over the … continue reading

Cloudflare announces zero-trust solution for companies experimenting with AI

Cloudflare One for AI was released as a collection of features that help teams build with the latest AI services while maintaining a zero-trust security posture. “Cloudflare One’s goal is to allow you to safely use the tools you need, wherever they live, without compromising performance. These features will feel familiar to any existing use … continue reading

Dell updates storage portfolio to offer improved cyber resiliency, energy efficiency, and automation

Dell Technologies today announced updates that have been made to its storage portfolio in order to increase cyber resiliency, energy efficiency, and automation. These updates are intended to assist users along their multicloud journeys. With this update, PowerStore, Dell’s all-flash data storage array, is increasing its security to help organizations adopt a Zero Trust model. … continue reading

Delivering zero trust security for Kubernetes in 6 steps

It’s no secret that businesses and organizations are embracing cloud services, containers, and other innovations to boost business productivity, scale more efficiently, and better manage infrastructure costs. However, transitioning legacy environments to the cloud introduces new challenges around securing dynamic and ephemeral cloud infrastructure. How can organizations unlock the full potential of the cloud without … continue reading

Dell expands zero trust offerings with identity and endpoint protection

Dell announced new services for Microsoft products that focus on zero trust, including Identity and Endpoint Protection with Microsoft Zero Trust.  The new capability aims to help companies achieve zero trust alignment by providing expert guidance, implementation services, adoption and change management strategies.  It provides assessments of Active Directory and Azure Active Directory and offers … continue reading

Report: Over half of organizations have a Zero Trust Initiative in place

The number of organizations that have some sort of Zero Trust initiative in place has more than doubled in the last year. This finding comes from the security company, Okta, which has announced the results of its fourth annual State of Zero Trust Security Report. The survey looked at 700 security leaders and revealed that … continue reading

Citrix Secure Private Access released to support flexible work models

The newly released Citrix Secure Private Access is a cloud-delivered, zero-trust network access offering that allows companies to provide employees access to apps and data that they need, from a variety of device types.  “The IT pendulum has been swinging toward flexible work models for years, and the pandemic has accelerated the velocity,” said John … continue reading

No one is cyber-secure in a cyberwar

The potential for cyberattacks has placed many organizations beyond Ukraine on high alert for any threats, and has left them wondering what they can do to bolster their security posture.  “Unlike traditional warfare, which generally only has impacts in and around a specific conflict zone, cyberattacks can have far-reaching impacts beyond the initial target that … continue reading

DoControl announces no-code security workflows for SaaS applications

The automated SaaS security company DoControl announced no-code security workflows that brings Zero Trust into the SaaS data layer. DoControl’s security workflows allow for consistent, granular, and customizable data access controls, which helps to close the gaps found in inflexible hard-coded and out-of-the-box policies. “Security teams are becoming increasingly frustrated with the lack of visibility … continue reading

IBM expands zero trust strategy

IBM expanded its zero trust strategy with new Secure Access Service Edge (SASE) services to help modernize network security.  SASE is a new architecture model designed to address the requirements of organizations that are digitally transforming, adopting cloud and SaaS applications, and providing services to a hybrid workforce and customer base.  The new service leverages … continue reading

DH2i launches free DxEnterprise & DxOdyssey Developer Editions

DH2i announced the launch of developer editions of its DxEnterprise and DxOdyssey software, which offer free licenses for non-production use and trials.  DxEnterprise enables users to manage and ensure high availability (HA) for a variety of workloads such as SQL Server at the instance level and also SQL Server availability groups inside or outside containers.  … continue reading

DMCA.com Protection Status

Get access to this and other exclusive articles for FREE!

There's no charge and it only takes a few seconds.

Sign up now!