365体育滚球

Zero Trust

365体育滚球A network security architecture that relies on authenticating all users and verifying all devices before granting access to resources, regardless of where any of the latter may be located, and which relies on micro-segmentation to grant access to only those specific resources to which users are permitted according to policy.


M&A Insight

365体育滚球2020 Tech M&A Outlook: Information Security

365体育滚球Last year, overall information security (infosec) M&A was up for the fourth straight year to a total of 141 deals, which eclipsed the all-time record of 132 transactions set in 2015 and was up from 131 acquisitions in 2018.

Voice of the Enterprise

Information Security, Workloads and Key Projects 2019

Market Insight

365体育滚球Microsoft Ignite: Security takes Center Stage – Identity as the New Control Plane

Within security, Microsoft has a unique opportunity: Windows is ubiquitous on endpoints, Office 365 is an equally ubiquitous productivity suite, capabilities from Exchange to the Power portfolio add to its enterprise presence, and Azure has become a major contender among cloud providers.

Market Insight

365体育滚球A Primer on Quantum Security

365体育滚球Quantum key distribution guarantees the secure transmission of a key, but it is still susceptible to other attacks – if an unauthenticated malicious caller rings the holder of the key, for example, and persuades the holder to email it to them, the benefit of quantum technology goes out the window.

Technology & Business Insight

365体育滚球Beyond the Perimeter - From ‘Zero Trust’ to ‘Unified Access Control’

365体育滚球Historically, the fundamental security model was to erect a ‘perimeter’ around the corporate network and assume anyone inside was ‘trusted’ and anyone on the outside was ‘untrusted.’ Cue worn out security clichés and metaphors: ‘crunchy on the outside, soft and chewy on the inside,’ ‘moat and castle,’ among others.

Market Insight

365体育滚球One Step Beyond: Cisco Picks Up MFA Leader DUO Security to Further its Zero-Trust Vision

We predicted that it was only a matter of time before network security vendors added identity management capabilities to combat both the eroding network perimeter as well as the existential threat to their established VPN and network security businesses posed by new innovations such as zero trust and software-defined networking (SDN).