Access Control
Access Control | News, how-tos, features, reviews, and videos
What is zero trust? A model for more effective security
As the security model becomes the preferred security strategy, it’s worth looking at what it is and what it takes to achieve.
Royal Caribbean adopts zero trust on land and sea
The cruise line boosted security and lowered costs with Zscaler’s zero-trust services for network access.
Work from home is here to stay, so how should IT adjust?
WFH strategy should cover the basics of performance and security, but also extend to ergonomics, online meeting etiquette and data retention
What is Zero Trust Network Access?
ZTNA is a security strategy (not a product) that says that all devices and users are considered untrusted until they can be authenticated.
How to set up DHCP failover on Windows Server
A few tips on how to make sure the DHCP infrastructure issuing IP addresses isn’t a single point of failure.
Axis adds automation, onboarding features to Atmos ZTNA network access software
Axis is also offering migration tools and a buyback program for those looking to move from legacy ZTNA (zero trust network access) applications.
Consulting firms jump on the Zero Trust bandwagon
Deloitte's new Zero Trust Access service and HCL's collaboration with Palo Alto Networks mark a sustained trend towards offering Zero Trust security services for clients.
5 mistakes to avoid when implementing zero-trust
Don’t get sidetracked by vendor hype, don’t forget the user experience and don’t skip basic security hygiene, experts say
8 questions to ask vendors about zero trust network access (ZTNA)
Most companies understand they need to move from perimeter-based security to a zero-trust model, and they know they can’t purchase zero trust as an off-the-shelf product. Here are eight questions to ask prospective vendors.
Who’s selling SASE and what do you get?
SASE rolls networking and security into a cloud service, making it easier for enterprises to provide simple, secure access to corporate resources. Many vendors offer SASE services, but what they actually provide and how they provide...
What is NAC and why is it important for network security?
NAC plays a key role in Zero Trust network access (ZTNA), and is a powerful tool for securing IoT devices and protecting mobile and remote workers
Zero Trust is hard but worth it
Work-at-home has revealed inadequacies in perimeter firewalls and VPNs that Zero Trust can remedy if you’re willing to put in the time.