Security & Analytics
How it works
Overview & Locations
Cyxtera Federal Group
News & Events
©2018 Cyxtera Technologies, Inc.
Thoughts on Software-Defined Perimeters and the future of Network Security.
Read My Lips: Don't Be a Botnet
These days, most organizations are aware that they can be the target of a DDoS attack. They've put in place protections to keep their public...
Cisco’s Critical VPN Vulnerability Fuels the Mandate for Software-Defined Perimeters
Cisco’s critical security vulnerability in its SSL VPN solution, Adaptive Security Appliance (ASA), is the latest proof that it’s time for a...
Consistent Security across Hybrid Cloud: AppGate Insight
Security techniques used in on-premises systems are not designed to perform at cloud scale. These techniques have cost models unsuitable for...
Addressing Network Segmentation for PCI 3.2 with the Software-Defined Perimeter
Most companies selling to the public – and certainly all e-commerce companies – are required to comply with the Payment Card Industry Data Security Standards (PCI DSS). Basically, all businesses that accept credit cards as payment must adhere to the PCI standards, and go through a certification process on an annual basis.
Software-Defined Perimeter: Identity-Based Security for Hybrid Environments
I’ve talked a lot about what is a software-defined perimeter (SDP) and the benefits of SDP over network access control (NAC) solutions. At a...
How to Overcome Network Access Control Limitations
Enterprise technology has changed. Work habits have changed. And the network perimeter has dissolved.
The Trends Demanding a Software-Defined Perimeter
From cloud security to malware prevention and the software-defined perimeter, here’s what we think every security professional in 2018 should know about.
Is Your AWS Environment a Security Risk?
There’s no dispute, AWS offers enterprises huge benefits. But it also could be putting your organization at risk.
Why Network Access Control Risk is Failing Security Professionals
Most organizations still rely on old network technologies.
Resolving Problems with Jump Boxes and Network Security
If you have worked in IT long enough, chances are that you have been part of or administered an environment where you (or members of the IT/development team) were required to implement and utilize a jump box to access protected resources.
BeyondCorp, Zero Trust, SDP & a Grand Unified Theory of Network Security
Let me begin with the bad news.
What’s Better: NAC or Software-Defined Perimeter?
Network security solutions that most organizations are deploying are clearly falling short (insert any data breach news headline that comes to mind here!).