The Route to Zero Trust Travels Through Identity

There is no such thing as a trusted network anymore. Because applications and users aren’t inside a physical network perimeter like they used to be, securing your network alone is no longer enough to protect your data, brand and reputation. Instead, trust must move to users and systems. But trust should never be automatic—regardless of [...]

Top Concerns Around Enabling DaaS

Today’s workforce is rapidly changing, and with the development of virtual workspaces it has become increasingly convenient and relatively easy for people to work from anywhere. If your organization has not yet transitioned to using digital workspaces and is considering making the switch to a Desktop as a Service (DaaS) model, you are probably trying [...]

4 Reasons Authentication and Threat Detection Are Better Together

“The whole is greater than the sum of its parts.” As philosophies go, it remains steadfastly true regardless of how the world has changed. It’s a more eloquent way of saying that connections and integrations that leverage the best of individual components produce better outcomes than those achieved individually. Integrations also impact security technologies, and [...]

Pass on Passwords: Multi-factor Authentication Is Better Security

Truth is, nobody likes passwords. From a user standpoint, they’re hard to remember. From a security standpoint, they’re ineffective. According to Frank Abagnale, the ex-con who inspired the movie Catch Me If You Can and who now works for the FBI, “passwords are for treehouses.” Abagnale’s story is fascinating and his experience in cybersecurity spans [...]