Operations | Monitoring | ITSM | DevOps | Cloud

Zero Trust Network Access: Accelerating Zero Trust Maturity with nZTA

Covid made the hypothetical necessity of IT risk planning a reality. Many organizations responded to the immediate need for remote workforces by adding more VPN licenses. But while adding more VPN capacity solved the problem of resource access, it also led to network bottlenecks and application latencies.

How Ivanti is Helping the Federal Government Make Zero Trust a Reality

As you may have heard, Ivanti was selected by the National Institute of Standards and Technology’s (NIST’s) National Cybersecurity Center of Excellence (NCCoE) to participate as a collaborator in its Implementing a Zero Trust Architecture project.

Why implementing Zero Trust is more important than ever before

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, we explore why organizations should implement Zero Trust in 2021. In 2010, John Kindervag introduced the concept of “Zero Trust” which has become a touchstone for cyber resilience and persistent security. Zero Trust is not a security product, architecture, or technology.

Sponsored Post

Webinar featuring IDC's Mark Leary: Make your IT operations future-proof with the Branch of One architecture

At the start of the pandemic, IT organizations had to undergo radical changes to support remote work. Given the urgency to shift to remote operations, IT admins opted for band-aid solutions to retain business continuity and stay connected to the core of their networks from remote locations. But now, many organizations are moving toward hybrid workforce options with employees choosing to work from both their home and office locations.

Out-Of-The-Box Zero Touch Network Monitoring

AI monitoring technologies have the potential to introduce significant cost savings for CSPs. Based on machine learning and fully autonomous, these monitoring solutions provide high ROI by dramatically reducing Time to Detection (TTR), Time to Resolution (TTR), the total number of alerts, and the number of false positives and negatives.

Fashionably Late: The Zero Trust Trend is Here to Stay

I have often joked that IT, and in particular cybersecurity, is like fashion — not a lot is ever new, just reimagined and, in some cases, improved. As I sit pondering the beauty of my COVID-19 comb-over mullet, I have found myself thinking about how this fashion analogy applies to zero trust.

Wall Street Journal Predicts Dire Cybersecurity Days Ahead, Endorses Zero Trust

Let’s be honest for a second. This is a corporate blog. Yes, we aim to provide our readers with actionable, educational information. And, yes, we strive for complete transparency. But, at the end of the day, we understand if you’re skeptical of some of what’s written here. We’re a business, not a news publication, and it’s impossible for us to be completely unbiased all the time.

Silver Peak Zero Touch Configuration (ZTC) Demo

Teneo's Technical Customer Success Consultant, Gavin Mason-Sword provides a short demonstration on how to configure Silver Peak's Zero Touch Configuration (ZTC). The video demonstrates the ability to deploy sites with zero touch configuration using Silver Peak Orchestrator. ZTC enables the bulk staging of configuration for larger scale deployments. It allows for configuration cloning to reduce the risk of human error and also allows for ongoing configuration changes through a centralized, standard format. #TeneoGrp

Pipeline Ransomware. Could I Be Next?

If you have been following the news or trying to buy gas in Atlanta, you probably have already heard about the ransomware attack on one of the most important strategic pipelines in the US. 2020 saw ransomware attacks skyrocket and now 2021 seems to be following the trend. The current situation begs us to rethink how we think about our security practices and mindset. One area of security that you may have heard about is Zero Trust (ZT).