Access Control

Access Control | News, how-tos, features, reviews, and videos

data center female it specialist using laptop server farm cloud and picture id1336250828
zero trust

zero trust technologies conceptual illustration illustration id1398701432

Consulting firms jump on the Zero Trust bandwagon

Deloitte's new Zero Trust Access service and HCL's collaboration with Palo Alto Networks mark a sustained trend towards offering Zero Trust security services for clients.

Conceptual image of a network labeled 'Zero Trust.'

5 mistakes to avoid when implementing zero-trust

Don’t get sidetracked by vendor hype, don’t forget the user experience and don’t skip basic security hygiene, experts say

12 zero trust

Who is selling Zero Trust Network Access (ZTNA) and what do you get?

Vendors are offering cloud-based services that support the ZTNA framework for VPN replacement and access control policy enforcement

Tech Spotlight   >   Cybersecurity [CSO]   >   Hands gesture in conversation

8 questions to ask vendors about zero trust network access (ZTNA)

Most companies understand they need to move from perimeter-based security to a zero-trust model, and they know they can’t purchase zero trust as an off-the-shelf product. Here are eight questions to ask prospective vendors.

10 cloud security breach virtualization wireless

Who’s selling SASE and what do you get?

SASE rolls networking and security into a cloud service, making it easier for enterprises to provide simple, secure access to corporate resources. Many vendors offer SASE services, but what they actually provide and how they provide...

cyber technology security protection monitoring concept advanced picture id1276687348

What is NAC and why is it important for network security?

NAC plays a key role in Zero Trust network access (ZTNA), and is a powerful tool for securing IoT devices and protecting mobile and remote workers

Zero trust Netskope

Zero Trust is hard but worth it

Work-at-home has revealed inadequacies in perimeter firewalls and VPNs that Zero Trust can remedy if you’re willing to put in the time.

8 authentication basics password identity protected security

802.1X: What you need to know about this LAN-authentication standard

The IEEE 802.1X standard integrates enterprise authentication into wired or wireless LANs.

cloud security expert casb binary cloud computing cloud security by metamorworks getty

Cloudflare wants to be your corporate network backbone with centralized management and security

Magic WAN and Magic Firewall aim to simplify linking sites and datacenters while allowing organizations to better enforce security policies.

sd-wan

SASE check list: 7 key evaluation criteria

Not all SASE providers are created equal, and here's how IT decision makers can examine their options and choose the best fit.

Load More