Access Control

Access Control | News, how-tos, features, reviews, and videos

12 zero trust
Tech Spotlight   >   Cybersecurity [CSO]   >   Hands gesture in conversation

10 cloud security breach virtualization wireless

Who’s selling SASE and what do you get?

SASE rolls networking and security into a cloud service, making it easier for enterprises to provide simple, secure access to corporate resources. Many vendors offer SASE services, but what they actually provide and how they provide...

cyber technology security protection monitoring concept advanced picture id1276687348

What is NAC and why is it important for network security?

NAC plays a key role in Zero Trust network access (ZTNA), and is a powerful tool for securing IoT devices and protecting mobile and remote workers

Zero trust Netskope

Zero Trust is hard but worth it

Work-at-home has revealed inadequacies in perimeter firewalls and VPNs that Zero Trust can remedy if you’re willing to put in the time.

8 authentication basics password identity protected security

802.1X: What you need to know about this LAN-authentication standard

The IEEE 802.1X standard integrates enterprise authentication into wired or wireless LANs.

cloud security expert casb binary cloud computing cloud security by metamorworks getty

Cloudflare wants to be your corporate network backbone with centralized management and security

Magic WAN and Magic Firewall aim to simplify linking sites and datacenters while allowing organizations to better enforce security policies.

sd-wan

SASE check list: 7 key evaluation criteria

Not all SASE providers are created equal, and here's how IT decision makers can examine their options and choose the best fit.

An anonymous hooded laptop user is surrounded by binary code and graphed data. [security threat]

Zero trust planning: Key factors for IT pros to consider

Rolling out effective zero-trust network access calls for coordinating IT and security teams, data discovery, network segmentation.

Zero trust Netskope

Survey: Zero Trust benefits remote work during pandemic

Use of Zero Trust networking during Covid-19 increases remote use of personal devices on corporate networks, according to Enterprise Management Associates.

micro segmentation security lock binary network 2400x1600

How the network can support zero trust

Zero trust architecture calls for granting just enough access to network resources so individuals can accomplish their work tasks – nothing more – and the network itself can help.

Load More