Software-defined perimeter
What is Zero Trust Network Access (ZTNA)? The Zero Trust model, Framework and Technologies Explained
Virtual Private Networks (VPNs) have been used for years to provide remote connectivity, but they have limitations in terms of scalability and security. A technology… ...
Why VPNs and Passwords Aren’t Enough
Sometimes it’s the littlest things that can make the biggest difference. Take passwords, for instance. While few would argue against the necessity of choosing a strong password, many companies and employees continue ...
DH2i Extends Software-Defined Perimeter to IoT Devices
DH2i has launched DxOdyssey for IoT, an instance of its software-defined perimeter (SDP) and smart availability software encapsulated in a lightweight container to enable it to run on internet of things (IoT) ...
Ivanti Acquires MobileIron and Pulse Secure
Ivanti this week announced it has entered into a pair of agreements to acquire MobileIron and Pulse Secure as part of an effort to create a zero-trust platform that can be delivered ...
RasPi and SDP: Ensuring Impenetrable Perimeters in a Perimeterless World
Since its introduction, the lightweight yet effective credit card-sized Raspberry Pi (RasPi) computer has grown steadily in global popularity. This is because the RasPi offers an easy-to-learn (it originated as an educational ...
Zero Trust Can Fix Healthcare’s Security Problem
Hospitals and other healthcare facilities are under attack from cyber criminals. In 2019 healthcare was one of the most targeted industries. In the first half of 2019 alone, there were 168 attacks ...
Zero Trust Trends to Watch Out For in 2020
We all know Zero Trust is the new norm.The term, along with the model it defines, went from relative obscurity to having “household-name” status (well, if the people in your household work ...
VPNs—Better Off With ‘Em Or Without ‘Em?
Do VPNs make you more or less secure? This is a question many companies found themselves asking in 2019 ...
Shielding Applications to Prevent DDoS Attacks
A software-defined perimeter can be an integral tool in protecting against DDoS attacks One common security threat that corporate networks, applications and web-based services have been failing to effectively defend against is ...
Time for Something New…
Six years ago, we started Safe-T to bring consistency and simplicity to secure access. We knew, back in the early days of the digital transformation, that attackers would use this new opportunity ...