Access Control

Access Control | News, how-tos, features, reviews, and videos

12 zero trust
cloud security

Conceptual image of a network labeled 'Zero Trust.'

What is zero trust? A model for more effective security

As the security model becomes the preferred security strategy, it’s worth looking at what it is and what it takes to achieve.

Conceptual image of a network labeled 'Zero Trust.'

Royal Caribbean adopts zero trust on land and sea

The cruise line boosted security and lowered costs with Zscaler’s zero-trust services for network access.

screen shot remote worker

Work from home is here to stay, so how should IT adjust?

WFH strategy should cover the basics of performance and security, but also extend to ergonomics, online meeting etiquette and data retention

zero trust security model secured network picture id1313494602

What is Zero Trust Network Access?

ZTNA is a security strategy (not a product) that says that all devices and users are considered untrusted until they can be authenticated.

data center female it specialist using laptop server farm cloud and picture id1336250828

How to set up DHCP failover on Windows Server

A few tips on how to make sure the DHCP infrastructure issuing IP addresses isn’t a single point of failure.

zero trust

Axis adds automation, onboarding features to Atmos ZTNA network access software

Axis is also offering migration tools and a buyback program for those looking to move from legacy ZTNA (zero trust network access) applications.

zero trust technologies conceptual illustration illustration id1398701432

Consulting firms jump on the Zero Trust bandwagon

Deloitte's new Zero Trust Access service and HCL's collaboration with Palo Alto Networks mark a sustained trend towards offering Zero Trust security services for clients.

Conceptual image of a network labeled 'Zero Trust.'

5 mistakes to avoid when implementing zero-trust

Don’t get sidetracked by vendor hype, don’t forget the user experience and don’t skip basic security hygiene, experts say

Tech Spotlight   >   Cybersecurity [CSO]   >   Hands gesture in conversation

8 questions to ask vendors about zero trust network access (ZTNA)

Most companies understand they need to move from perimeter-based security to a zero-trust model, and they know they can’t purchase zero trust as an off-the-shelf product. Here are eight questions to ask prospective vendors.

10 cloud security breach virtualization wireless

Who’s selling SASE and what do you get?

SASE rolls networking and security into a cloud service, making it easier for enterprises to provide simple, secure access to corporate resources. Many vendors offer SASE services, but what they actually provide and how they provide...

cyber technology security protection monitoring concept advanced picture id1276687348

What is NAC and why is it important for network security?

NAC plays a key role in Zero Trust network access (ZTNA), and is a powerful tool for securing IoT devices and protecting mobile and remote workers

Zero trust Netskope

Zero Trust is hard but worth it

Work-at-home has revealed inadequacies in perimeter firewalls and VPNs that Zero Trust can remedy if you’re willing to put in the time.