POPULARITY
In this episode, we'll be taking a look at two increasingly important cybersecurity technologies: Zero Trust Network Access (ZTNA) and Software Security Edge (SSE).To help dissect these technologies and what they could mean for organizations in the face of the ever-increasing risk from ransomware, we're joined again by John Spiegel, and Jaye Tilson. They are both Field CTOs and Distinguished Technologists at HPE. This is Technology Now, a weekly show from Hewlett Packard Enterprise. Every week we look at a story that's been making headlines, take a look at the technology behind it, and explain why it matters to organizations and what we can learn from it. Do you have a question for the expert? Ask it here using this Google form: https://forms.gle/8vzFNnPa94awARHMA About this week's guests: https://www.linkedin.com/in/jaye-tillson/?originalSubdomain=uk https://www.linkedin.com/in/john-spiegel-2011543/ Sources and statistics cited in this episode: Ransomware attack rate from Statista: https://www.statista.com/statistics/204457/businesses-ransomware-attack-rate/KMPG research into ransomware: https://assets.kpmg.com/content/dam/kpmg/ca/pdf/2024/04/ca-cyber-incidents-and-intelligence-2023-en.pdfNASA's laser communication record: https://www.jpl.nasa.gov/news/nasas-laser-comms-demo-makes-deep-space-record-completes-first-phase/
Tech behind the Trends on The Element Podcast | Hewlett Packard Enterprise
In this episode, we'll be taking a look at two increasingly important cybersecurity technologies: Zero Trust Network Access (ZTNA) and Software Security Edge (SSE).To help dissect these technologies and what they could mean for organizations in the face of the ever-increasing risk from ransomware, we're joined again by John Spiegel, and Jaye Tilson. They are both Field CTOs and Distinguished Technologists at HPE. This is Technology Now, a weekly show from Hewlett Packard Enterprise. Every week we look at a story that's been making headlines, take a look at the technology behind it, and explain why it matters to organizations and what we can learn from it. Do you have a question for the expert? Ask it here using this Google form: https://forms.gle/8vzFNnPa94awARHMA About this week's guests: https://www.linkedin.com/in/jaye-tillson/?originalSubdomain=uk https://www.linkedin.com/in/john-spiegel-2011543/ Sources and statistics cited in this episode: Ransomware attack rate from Statista: https://www.statista.com/statistics/204457/businesses-ransomware-attack-rate/KMPG research into ransomware: https://assets.kpmg.com/content/dam/kpmg/ca/pdf/2024/04/ca-cyber-incidents-and-intelligence-2023-en.pdfNASA's laser communication record: https://www.jpl.nasa.gov/news/nasas-laser-comms-demo-makes-deep-space-record-completes-first-phase/
In this episode, we'll be taking a look at two increasingly important cybersecurity technologies: Zero Trust Network Access (ZTNA) and Software Security Edge (SSE).To help dissect these technologies and what they could mean for organizations in the face of the ever-increasing risk from ransomware, we're joined again by John Spiegel, and Jaye Tilson. They are both Field CTOs and Distinguished Technologists at HPE. This is Technology Now, a weekly show from Hewlett Packard Enterprise. Every week we look at a story that's been making headlines, take a look at the technology behind it, and explain why it matters to organizations and what we can learn from it. Do you have a question for the expert? Ask it here using this Google form: https://forms.gle/8vzFNnPa94awARHMA About this week's guests: https://www.linkedin.com/in/jaye-tillson/?originalSubdomain=uk https://www.linkedin.com/in/john-spiegel-2011543/ Sources and statistics cited in this episode: Ransomware attack rate from Statista: https://www.statista.com/statistics/204457/businesses-ransomware-attack-rate/KMPG research into ransomware: https://assets.kpmg.com/content/dam/kpmg/ca/pdf/2024/04/ca-cyber-incidents-and-intelligence-2023-en.pdfNASA's laser communication record: https://www.jpl.nasa.gov/news/nasas-laser-comms-demo-makes-deep-space-record-completes-first-phase/
This episode was recorded live at Security Field Day (XFD) 12 in October, 2024. As delegates at the event, JJ and Drew heard presentations from DigiCert, Dell Technologies, SonicWall, and Citrix. These presentations covered topics including digital certificate management, post-quantum cryptography, supply chain security, recovering from ransomware, Zero Trust Network Access (ZTNA), and Secure Service... Read more »
This episode was recorded live at Security Field Day (XFD) 12 in October, 2024. As delegates at the event, JJ and Drew heard presentations from DigiCert, Dell Technologies, SonicWall, and Citrix. These presentations covered topics including digital certificate management, post-quantum cryptography, supply chain security, recovering from ransomware, Zero Trust Network Access (ZTNA), and Secure Service... Read more »
In this episode, host Raghu Nandakumara sits down with Stephen J. White, the CEO of Viking Technology Advisors to discuss the critical role of Zero Trust Network Access (ZTNA), cloud adoption, and AI in modernizing network security. He emphasizes the importance of visibility, automation, and holistic approaches to enhance operational efficiency and security.--------“It's about making security the enabler for Google, like you just said, it is the enabler, but then it's also making it invisible to the user community, so that it's secured, controlled, managed, but they can do their jobs as effectively no matter where they are. And it's just, this is a really pivotal time." - Steve White--------Time Stamps (04:42) The security challenges of modernization(17:29) Connecting business and security outcomes (29:02) Should cybersecurity and network teams merge? (31:01) What will generative AI bring to security?(49:31) The borderless network and managing the perimeter --------SponsorAssume breach, minimize impact, increase resilience ROI, and save millions in downtime costs — with Illumio, the Zero Trust Segmentation company. Learn more at illumio.com.--------LinksConnect with Stephen on LinkedIn
In a world where businesses are constantly evolving and facing new challenges in cybersecurity and IT infrastructure, the importance of collaboration between IT and security teams has never been more critical. At the recent RSA Conference, Sean Martin had the opportunity to sit down with Tim Roddy from Open Systems to talk about the topics of business transformation, IT security, and the necessity of aligning IT and security initiatives for a more secure and efficient operation.Business and IT Transformation in the Digital AgeThe conversation kicked off discussing the challenges that businesses face in a rapidly changing digital landscape. Tim highlighted the need for businesses to adapt to transformations driven by factors like remote work, cloud migrations, and evolving business requirements. With threats constantly looming, the alignment of business processes, IT functions, and security measures becomes paramount to staying ahead of the curve.Zero Trust Network Access (ZTNA) - A Game-Changer in Connectivity and SecurityOne of the key topics discussed was the concept of Zero Trust Network Access (ZTNA) and its impact on network security. Tim shed light on the importance of implementing ZTNA to ensure secure and controlled access to critical applications and data. By deploying ZTNA, organizations can limit access to authorized personnel only, thereby reducing the risk of unauthorized access and potential data breaches.Bridging the Gap Between IT and Security TeamsTim emphasized the need for organizations to bridge the gap between IT and security teams, especially in smaller enterprises where resources are limited. By offering managed services like SASE (Secure Access Service Edge), Open Systems enables organizations to focus on core business activities while ensuring that IT and security functions are efficiently managed and monitored.Real-World Use Cases and Success StoriesThroughout the conversation, Tim shared insightful examples of how Open Systems has helped businesses, particularly in the manufacturing sector, enhance their security posture and IT infrastructure. From implementing ZTNA for secure access to critical equipment to transitioning from MPLS to SD WAN for cost efficiency and flexibility, Open Systems has been instrumental in driving IT and security transformations for organizations of all sizes.Looking Towards a Secure FutureAs businesses continue to navigate the complexities of modern cybersecurity challenges, the role of providers like Open Systems in guiding organizations towards a more secure and efficient future becomes increasingly significant. By offering tailored solutions, expert guidance, and proactive monitoring, Open Systems stands as a valuable partner in the journey towards robust IT and security operations.This conversation with Tim Roddy from Open Systems highlighted the critical need for businesses to prioritize IT and security transformation in today's digital landscape. By embracing collaboration, deploying innovative solutions like ZTNA, and relying on trusted partners for managed services, organizations can navigate the complexities of cybersecurity with confidence and efficiency.Reach out to Open Systems to learn more about their comprehensive IT and security solutions and embark on a transformative journey towards a more secure and resilient business infrastructure.Learn more about Open Systems: https://itspm.ag/opensystems-d11Note: This story contains promotional content. Learn more.Guest: Tim Roddy, Vice President Marketing, Open Systems [@RealOpenSystems]On LinkedIn | https://www.linkedin.com/in/troddy/ResourcesLearn more and catch more stories from Open Systems: https://www.itspmagazine.com/directory/open-systemsView all of our RSA Conference Coverage: https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverageAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story
In a world where businesses are constantly evolving and facing new challenges in cybersecurity and IT infrastructure, the importance of collaboration between IT and security teams has never been more critical. At the recent RSA Conference, Sean Martin had the opportunity to sit down with Tim Roddy from Open Systems to talk about the topics of business transformation, IT security, and the necessity of aligning IT and security initiatives for a more secure and efficient operation.Business and IT Transformation in the Digital AgeThe conversation kicked off discussing the challenges that businesses face in a rapidly changing digital landscape. Tim highlighted the need for businesses to adapt to transformations driven by factors like remote work, cloud migrations, and evolving business requirements. With threats constantly looming, the alignment of business processes, IT functions, and security measures becomes paramount to staying ahead of the curve.Zero Trust Network Access (ZTNA) - A Game-Changer in Connectivity and SecurityOne of the key topics discussed was the concept of Zero Trust Network Access (ZTNA) and its impact on network security. Tim shed light on the importance of implementing ZTNA to ensure secure and controlled access to critical applications and data. By deploying ZTNA, organizations can limit access to authorized personnel only, thereby reducing the risk of unauthorized access and potential data breaches.Bridging the Gap Between IT and Security TeamsTim emphasized the need for organizations to bridge the gap between IT and security teams, especially in smaller enterprises where resources are limited. By offering managed services like SASE (Secure Access Service Edge), Open Systems enables organizations to focus on core business activities while ensuring that IT and security functions are efficiently managed and monitored.Real-World Use Cases and Success StoriesThroughout the conversation, Tim shared insightful examples of how Open Systems has helped businesses, particularly in the manufacturing sector, enhance their security posture and IT infrastructure. From implementing ZTNA for secure access to critical equipment to transitioning from MPLS to SD WAN for cost efficiency and flexibility, Open Systems has been instrumental in driving IT and security transformations for organizations of all sizes.Looking Towards a Secure FutureAs businesses continue to navigate the complexities of modern cybersecurity challenges, the role of providers like Open Systems in guiding organizations towards a more secure and efficient future becomes increasingly significant. By offering tailored solutions, expert guidance, and proactive monitoring, Open Systems stands as a valuable partner in the journey towards robust IT and security operations.This conversation with Tim Roddy from Open Systems highlighted the critical need for businesses to prioritize IT and security transformation in today's digital landscape. By embracing collaboration, deploying innovative solutions like ZTNA, and relying on trusted partners for managed services, organizations can navigate the complexities of cybersecurity with confidence and efficiency.Reach out to Open Systems to learn more about their comprehensive IT and security solutions and embark on a transformative journey towards a more secure and resilient business infrastructure.Learn more about Open Systems: https://itspm.ag/opensystems-d11Note: This story contains promotional content. Learn more.Guest: Tim Roddy, Vice President Marketing, Open Systems [@RealOpenSystems]On LinkedIn | https://www.linkedin.com/in/troddy/ResourcesLearn more and catch more stories from Open Systems: https://www.itspmagazine.com/directory/open-systemsView all of our RSA Conference Coverage: https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverageAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story
Today's Heavy Networking, sponsored by Palo Alto Networks, discusses Zero Trust Network Access (ZTNA) across the Secure Access Service Edge (SASE). You could think of ZTNA, as VPN evolved and SASE as SD-WAN evolved. Not only do you get an overlay connectivity fabric, but you also get cloud-hosted security services. We talk about how it all works together, the role of client software, Palo Alto Networks' architecture, integrating an IDP, and more.
Today's Heavy Networking, sponsored by Palo Alto Networks, discusses Zero Trust Network Access (ZTNA) across the Secure Access Service Edge (SASE). You could think of ZTNA, as VPN evolved and SASE as SD-WAN evolved. Not only do you get an overlay connectivity fabric, but you also get cloud-hosted security services. We talk about how it all works together, the role of client software, Palo Alto Networks' architecture, integrating an IDP, and more. The post Heavy Networking 703: Integrating ZTNA And SASE With Palo Alto Networks (Sponsored) appeared first on Packet Pushers.
Today's Heavy Networking, sponsored by Palo Alto Networks, discusses Zero Trust Network Access (ZTNA) across the Secure Access Service Edge (SASE). You could think of ZTNA, as VPN evolved and SASE as SD-WAN evolved. Not only do you get an overlay connectivity fabric, but you also get cloud-hosted security services. We talk about how it all works together, the role of client software, Palo Alto Networks' architecture, integrating an IDP, and more.
Today's Heavy Networking, sponsored by Palo Alto Networks, discusses Zero Trust Network Access (ZTNA) across the Secure Access Service Edge (SASE). You could think of ZTNA, as VPN evolved and SASE as SD-WAN evolved. Not only do you get an overlay connectivity fabric, but you also get cloud-hosted security services. We talk about how it all works together, the role of client software, Palo Alto Networks' architecture, integrating an IDP, and more. The post Heavy Networking 703: Integrating ZTNA And SASE With Palo Alto Networks (Sponsored) appeared first on Packet Pushers.
Today's Heavy Networking, sponsored by Palo Alto Networks, discusses Zero Trust Network Access (ZTNA) across the Secure Access Service Edge (SASE). You could think of ZTNA, as VPN evolved and SASE as SD-WAN evolved. Not only do you get an overlay connectivity fabric, but you also get cloud-hosted security services. We talk about how it all works together, the role of client software, Palo Alto Networks' architecture, integrating an IDP, and more. The post Heavy Networking 703: Integrating ZTNA And SASE With Palo Alto Networks (Sponsored) appeared first on Packet Pushers.
Today's Heavy Networking, sponsored by Palo Alto Networks, discusses Zero Trust Network Access (ZTNA) across the Secure Access Service Edge (SASE). You could think of ZTNA, as VPN evolved and SASE as SD-WAN evolved. Not only do you get an overlay connectivity fabric, but you also get cloud-hosted security services. We talk about how it all works together, the role of client software, Palo Alto Networks' architecture, integrating an IDP, and more.
In an era where cyber threats continuously evolve, businesses everywhere grapple with safeguarding their digital assets. Enter the world of "Unlocking Zero Trust: Next-Level Cybersecurity Solutions." This isn't just another buzzword. Zero Trust Security has rapidly emerged as a frontrunner in the cybersecurity arena, addressing the most pressing challenges of our digital age. With escalating concerns over data breaches, the need for a robust and comprehensive security model has never been more paramount. The Zero Trust framework, which operates on the principle of "never trust, always verify," offers businesses an innovative, holistic approach, ensuring that every access request, whether coming from inside or outside the organization, undergoes rigorous validation. By adopting this model, companies aren't just bolstering their defenses—they're revolutionizing the way they think about digital security. Dive in as we unravel the intricacies of Zero Trust, shedding light on its pivotal role in today's cybersecurity landscape, and how it can be the game-changer your business needs in these unpredictable times. Chapter Stamps: Traditional VPN Challenges [00:00:00] Introducing Cloud VPN Benefits [00:08:30] Zero Trust Network Access (ZTNA) [00:17:01] Achieving Compliance and Security [00:17:55] Cost Comparison: SaaS vs. DIY [00:19:57] Getting in Touch with Good Access [00:20:32] Building with Heart and Passion [00:21:38] Pullout Quotes: "Zero trust cloud VPN is an essential part of today's compliance regulations." "Companies around the world can meet regulations by embracing zero trust network access." "Our goal is to cover as many security features as possible in one product." "The benefits of having it as a SaaS outweigh the challenges of doing it by yourself." "We're trying to help companies avoid the need to buy from multiple vendors." "Believe in a provider who offers comprehensive solutions, saving you both time and potential security risks." "We've built our product with heart, ensuring top-quality for every user." "The future of secure remote access lies in the evolution of business VPNs to cloud VPNs." Socials: Website: https://www.goodaccess.com/ Facebook: https://www.facebook.com/GoodAccessVPN LinkedIn: https://www.linkedin.com/company/goodaccess Twitter: https://twitter.com/goodaccessvpn Instagram: https://www.instagram.com/goodaccessvpn ----more---- Notice to the Super Entrepreneurs community: Before we part, remember to join our Private Facebook group, 'Mindset for Business Success.' Here we share mindset wisdom to elevate your life and business, ready for a transformative journey? This group is your key to unlocking potential and achieving business growth. Don't miss out on this incredible free resource. Join us in 'Mindset for Business Success' today! Join Now ----more---- Disclaimer: Please be aware that the opinions and perspectives conveyed in this podcast are solely those of our guests and do not necessarily represent the views, ideologies, or principles of Super Entrepreneurs Podcast, its associated entities, or any organizations they represent or are affiliated with. We provide a platform for discussion and exploration, and the content of each episode is understood to be independent expressions from our guests, rather than a reflection of the beliefs held by the podcast or its hosts.
Appgate's Brian Cederdahl steps up to the One Mic Stand to explain how virtual private network (VPN) technology is stuck in the distant past. Learn how Appgate provides secure access solutions designed for how people actually work and connect. Brian details how Appgate future-proofs technology investments while giving its customers effective, efficient and secure access to the resources they need to succeed. Appgate provides cybersecurity solutions for people, devices and systems based on the principles of Zero Trust and is a recognized leader in Zero Trust Network Access (ZTNA). As Brian says, "Friends don't let friends use VPN."
Netskope, anuncia ZTNA Next, la evolución de su solución Zero Trust Network Access (ZTNA), en continuo desarrollo de Netskope Endpoint SD-WAN para dar una mejor seguridad y conectividad al migrar desde VPNs.
Today's Tech Bytes podcast dives into the notion of applying Zero Trust Network Access (ZTNA) to users on campus as well as remote workers. Our sponsor is Fortinet and we discuss bringing ZTNA to users on prem, as well as IoT devices.
Today's Tech Bytes podcast dives into the notion of applying Zero Trust Network Access (ZTNA) to users on campus as well as remote workers. Our sponsor is Fortinet and we discuss bringing ZTNA to users on prem, as well as IoT devices. The post Tech Bytes: Extending ZTNA To Remote And Office Workers With Fortinet (Sponsored) appeared first on Packet Pushers.
Today's Tech Bytes podcast dives into the notion of applying Zero Trust Network Access (ZTNA) to users on campus as well as remote workers. Our sponsor is Fortinet and we discuss bringing ZTNA to users on prem, as well as IoT devices.
Today's Tech Bytes podcast dives into the notion of applying Zero Trust Network Access (ZTNA) to users on campus as well as remote workers. Our sponsor is Fortinet and we discuss bringing ZTNA to users on prem, as well as IoT devices. The post Tech Bytes: Extending ZTNA To Remote And Office Workers With Fortinet (Sponsored) appeared first on Packet Pushers.
Today's Tech Bytes podcast dives into the notion of applying Zero Trust Network Access (ZTNA) to users on campus as well as remote workers. Our sponsor is Fortinet and we discuss bringing ZTNA to users on prem, as well as IoT devices. The post Tech Bytes: Extending ZTNA To Remote And Office Workers With Fortinet (Sponsored) appeared first on Packet Pushers.
Today's Tech Bytes podcast dives into the notion of applying Zero Trust Network Access (ZTNA) to users on campus as well as remote workers. Our sponsor is Fortinet and we discuss bringing ZTNA to users on prem, as well as IoT devices.
Fortinet's John Maddison delves into the main drivers in the cybersecurity threat landscape today, the complexity they're creating, and the universal Zero Trust Network Access (ZTNA) solutions enterprises need to solve them. Can SASE create an integrated zero trust architecture across the entire infrastructure in a hybrid world where applications continue to move? In this... Read More The post SASE Convergence: Civilizing the Wild West of Cybersecurity appeared first on MEF.
MetTel CTO Ed Fox returns to the podcast for an update on enterprise interest in the Secure Access Service Edge (SASE) trend that brings together networking and security services. Fox explains how MetTel's own approach to SASE has evolved and which components are key to any SASE service, such as Zero Trust Network Access (ZTNA). In addition, Fox shares how the service provider is working with customers making the shift from copper wire networks to fiber, cellular and VOIP networks. See acast.com/privacy for privacy and opt-out information.
MetTel CTO Ed Fox returns to the podcast for an update on enterprise interest in the Secure Access Service Edge (SASE) trend that brings together networking and security services. Fox explains how MetTel's own approach to SASE has evolved and which components are key to any SASE service, such as Zero Trust Network Access (ZTNA). In addition, Fox shares how the service provider is working with customers making the shift from copper wire networks to fiber, cellular and VOIP networks.
In today's sponsored Heavy Networking show with VMware, we take a fresh look at VMware's SASE and Zero Trust Network Access (ZTNA) solution. VMware has a breadth of products that allow for a differentiated overall solution. Joining us today is Craig Connors, Vice President and Chief Technology Officer of Service Provider and Edge at VMware.
In today's sponsored Heavy Networking show with VMware, we take a fresh look at VMware's SASE and Zero Trust Network Access (ZTNA) solution. VMware has a breadth of products that allow for a differentiated overall solution. Joining us today is Craig Connors, Vice President and Chief Technology Officer of Service Provider and Edge at VMware.
In today's sponsored Heavy Networking show with VMware, we take a fresh look at VMware's SASE and Zero Trust Network Access (ZTNA) solution. VMware has a breadth of products that allow for a differentiated overall solution. Joining us today is Craig Connors, Vice President and Chief Technology Officer of Service Provider and Edge at VMware.
In today's sponsored Heavy Networking show with VMware, we take a fresh look at VMware's SASE and Zero Trust Network Access (ZTNA) solution. VMware has a breadth of products that allow for a differentiated overall solution. Joining us today is Craig Connors, Vice President and Chief Technology Officer of Service Provider and Edge at VMware. The post Heavy Networking 607: ZTNA Everywhere With VMware SASE (Sponsored) appeared first on Packet Pushers.
In today's sponsored Heavy Networking show with VMware, we take a fresh look at VMware's SASE and Zero Trust Network Access (ZTNA) solution. VMware has a breadth of products that allow for a differentiated overall solution. Joining us today is Craig Connors, Vice President and Chief Technology Officer of Service Provider and Edge at VMware. The post Heavy Networking 607: ZTNA Everywhere With VMware SASE (Sponsored) appeared first on Packet Pushers.
In today's sponsored Heavy Networking show with VMware, we take a fresh look at VMware's SASE and Zero Trust Network Access (ZTNA) solution. VMware has a breadth of products that allow for a differentiated overall solution. Joining us today is Craig Connors, Vice President and Chief Technology Officer of Service Provider and Edge at VMware. The post Heavy Networking 607: ZTNA Everywhere With VMware SASE (Sponsored) appeared first on Packet Pushers.
Ericom Software recently announced the release of ZTEdge, an all-in-one zero trust cloud security platform designed specifically for midsize enterprises, a market underserved yet highly vulnerable to cyberattacks. Ericom's CSO, Chase Cunningham joins me on the Tech Talks Daily Podcast to discusses the market, positioning, and why this product is an industry-first for midsize enterprises. Large enterprises have accelerated their adoption of zero-trust security in response to the increased levels of cyberattacks experienced during the pandemic. Equally vulnerable, midsized enterprises and small businesses have the same need for zero-trust security protection. Still, existing solutions are too complex, too expensive, and too resource-intensive for many of them to adopt. ZTEdge provides a solution that is right-sized for the needs of this market. It offers a comprehensive solution that reduces cyber risk, cuts complexity, and improves performance, all at price points dramatically lower than competitive offerings. We explore the following key areas: Identifying Users and Authenticating Devices: connects the right people and devices to the right apps and resources by using password-based or passwordless authorization and multi-factor authentication. Secure Web and Internet Access: protect users as they interact with the web and email by leveraging URL filtering, anti-virus scanning, anti-phishing protection, remote browser isolation (RBI), and more. Secure Remote Private Application Access: provides a simple way to connect remote workers with private cloud or on-premises applications, using Zero Trust Network Access (ZTNA) capabilities. SaaS Application Access Control: offers dedicated ZTEdge tenant IP addresses allowing organizations to enforce IP-based access policies to secure apps like Office 365 or Salesforce, thereby eliminating credential theft risks. Network Protection and Monitoring: segments and monitors networks using machine learning-powered micro-segmentation and granular network traffic analysis – stopping threats from spreading. User-Branch-Internet Connectivity: integrated SD-WAN capabilities allow an organization to securely connect users and offices and securely route branch traffic directly to the ZTEdge cloud and internet, eliminating the need to backhaul branch traffic over costly MPLS circuits.
Brandon interviews Justin McCarthy the CTO and Co-founder of strongDM and they discuss Zero Trust, securing hybrid clouds and keeping auditors happy. Plus, a few tips on gardening during a pandemic. Links strongDM Free Trial (https://www.strongdm.com/sdt) What is Zero Trust Network Access (ZTNA) (https://www.strongdm.com/blog/what-is-zero-trust) Contact Justin Email: justin@strongdm.com (mailto:justin@strongdm.com) LinkedIn: justinmccarthy (https://www.linkedin.com/in/justinmccarthy/)
Today's Tech Bytes, sponsored by NetMotion Software, explores how NetMotion integrates client VPNs with more modern approaches, including Zero Trust Network Access (ZTNA) and the Software Defined Perimeter. Our guest is Mike Spence, Systems Engineer at NetMotion.
Today's Tech Bytes, sponsored by NetMotion Software, explores how NetMotion integrates client VPNs with more modern approaches, including Zero Trust Network Access (ZTNA) and the Software Defined Perimeter. Our guest is Mike Spence, Systems Engineer at NetMotion.
Today's Tech Bytes, sponsored by NetMotion Software, explores how NetMotion integrates client VPNs with more modern approaches, including Zero Trust Network Access (ZTNA) and the Software Defined Perimeter. Our guest is Mike Spence, Systems Engineer at NetMotion.
Laut Gartner ist Zero Trust Network Access (ZTNA) die Technologie, mit der Zero Trust Realität wird und das „geliebte“ VPN ersetzt wird. Bis 2023 sollen demnach 60 Prozent der Unternehmen die meisten ihrer VPNs mit Fernzugriff zugunsten von ZTNA auslaufen lassen. Doch was steckt genau hinter Zero Trust und ZTNA? Das Podcast-Interview von Oliver Schonschek, News-Analyst bei Insider Research, mit Marc Kokje, Consulting Sales Engineer Major and Large Enterprise Accounts bei Zscaler, liefert Antworten.