Security & Analytics
AppGate SDP Overview
AppGate for Public Cloud
Features and Benefits
NAC vs. SDP
AppGate Insight Overview
Features & Benefits
Insight For Public Cloud
Overview & Locations
Cyxtera Federal Group
News & Events
©2018 Cyxtera Technologies, Inc.
Thoughts on Software-Defined Perimeters and the future of Network Security.
Cisco’s Critical VPN Vulnerability Fuels the Mandate for Software-Defined Perimeters
Cisco’s critical security vulnerability in its SSL VPN solution, Adaptive Security Appliance (ASA), is the latest proof that it’s time for a...
Consistent Security across Hybrid Cloud: AppGate Insight
Security techniques used in on-premises systems are not designed to perform at cloud scale. These techniques have cost models unsuitable for...
Addressing Network Segmentation for PCI 3.2 with the Software-Defined Perimeter
Most companies selling to the public – and certainly all e-commerce companies – are required to comply with the Payment Card Industry Data Security Standards (PCI DSS). Basically, all businesses that accept credit cards as payment must adhere to the PCI standards, and go through a certification process on an annual basis.
Software-Defined Perimeter: Identity-Based Security for Hybrid Environments
I’ve talked a lot about what is a software-defined perimeter (SDP) and the benefits of SDP over network access control (NAC) solutions. At a...
How to Overcome Network Access Control Limitations
Enterprise technology has changed. Work habits have changed. And the network perimeter has dissolved.
The Trends Demanding a Software-Defined Perimeter
From cloud security to malware prevention and the software-defined perimeter, here’s what we think every security professional in 2018 should know about.
Is Your AWS Environment a Security Risk?
There’s no dispute, AWS offers enterprises huge benefits. But it also could be putting your organization at risk.
Why Network Access Control Risk is Failing Security Professionals
Most organizations still rely on old network technologies.
Resolving Problems with Jump Boxes and Network Security
If you have worked in IT long enough, chances are that you have been part of or administered an environment where you (or members of the IT/development team) were required to implement and utilize a jump box to access protected resources.
BeyondCorp, Zero Trust, SDP & a Grand Unified Theory of Network Security
Let me begin with the bad news.
What’s Better: NAC or Software-Defined Perimeter?
Network security solutions that most organizations are deploying are clearly falling short (insert any data breach news headline that comes to mind here!).
What is a Software-Defined Perimeter?
Many recent headlines have highlighted the fact that the traditional perimeter-based approach to network security has failed to adequately protect organizations, and that a new approach is needed.