Cisco plans to debut a common design language across its network and security offerings so that products such as Cisco Meraki and Umbrella will no longer look or feel different from one another, says Jeetu Patel, executive vice president and general manager for security and collaboration at Cisco.
Juniper Networks has debuted security service edge capabilities that help clients consistently apply zero trust policies in the cloud regardless of the user or device. Juniper takes the policies customers already use within their network and converts them to cloud-delivered policies with one click.
Network operations and network security leaders need a solution that connects and protects their distributed, hybrid workforces – including branch offices and edge locations. Secure Access Service Edge (SASE) is an integrated, cloud-centric model that converges networking and security capabilities, offering secure...
Tufin has promoted chief revenue officer Raymond Brancato to CEO and tasked him with simplifying visibility, compliance and automation for AWS and Azure. Brancato plans to focus on helping clients better understand their security posture in cloud, SD-WAN and SASE environments.
The embrace of the open internet as the new corporate network has created challenges around remote access and employee security, says Perimeter 81 CEO Amit Bareket. Perimeter 81 has attempted to simplify securing remote work by bringing ZTNA and SWG together on a single management console.
Netskope has taken on more than $400 million in debt to further develop its SASE platform and expand its go-to-market activities. The convertible notes will allow Netskope to capitalize on being one of the only providers of single-vendor SASE and take advantage of a $36 billion market opportunity.
The Essential Eight is a prioritised list of core mitigation strategies developed by The Australian Cyber Security Centre (ACSC) to assist organisations in protecting their systems against a range of attacks. The Australian Signals Directorate (ASD) considers the Essential Eight as one of the most effective defence...
Staying one step ahead of both threat actors and competitors is a tall task for Palo Alto Networks given the breadth of its cybersecurity portfolio. Palo Alto Networks has committed to having best of breed features and functionality in each of the technology categories where it chooses to play.
The security industry has traditionally tried to protect sensitive data by putting control points on endpoints or networks, but Skyhigh Security has taken a different approach. The company applies consistent policies around how data is treated across its ZTNA, SWG and CASB offerings.
Network security is no longer confined to the data center. As security shifts to the cloud, the tried- and- true perimeter-based model just can't keep up. Today's cybersecurity professionals are contending with an entirely new type of network and an entirely new set of security needs.
Download this whitepaper to...
Zscaler has notched large, multiyear, multipillar deals as the economic downturn prompts clients to seek replacements for expensive legacy point products, says CEO Jay Chaudhry. Clients are increasingly buying Zscaler's secure web gateway, private access and digital experience tools as one bundle.
The nature of the new "norm" in this post-pandemic era of remote work is revolutionizing how your organization has to operate. With dozens of applications used across a diverse landscape, how do you ensure that your organization stays secure while being compliant with changing rules and regulations?
Versa Networks has completed a pre-IPO funding round to build out a cloud security portfolio and bring zero trust functionality to campus and branch settings. The SASE vendor says the $120 million Series E round will allow the company to build or buy technology around SSPM, CSPM and CWPP.
Every organization has employees distributed across multiple locations, such as headquarters and branch offices. With the Covid-19 pandemic, remote working from home has become a norm. Wherever they are, a company’s staff will need to access IT services, applications and data that are also spread out over a number...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.