Technology news for Australia's largest enterprises
These search results are from across the Techday network of sites
Why zero trust is the best security strategy for mobile computing - Zscaler
Zero trust network access is helping organisations address the protection problem posed by mobile computing and cloud-based applications.
Enterprises look to zero trust network access to thwart VPN attacks
“Though it is encouraging to see so many organisations are pursuing ZTNA to close gaps created by VPNs, I am surprised that more than half of those surveyed believe their current infrastructure is reliable enough to protect the enterprise."
Pulse Secure launches new access management and threat mitigation features
Pulse Secure aims to enable enterprise and service provider organisations to progress Zero Trust security and mitigate hybrid IT risks.
Symantec named Leader by Forrester for Data Security Portfolio
Symantec was recognised as a Leader based on current offering, strategy, and market presence with the highest overall ranking for current offerings.
Quantum computing in the telecom sector and more cybersecurity trends
According to a new report, quantum computing will be a destabiliser for the telecom sector, making PKI obsolete in the near future.
How flexible identity systems support mobile working – Ping Identity
Increased time outside of the official workplace has become the reality of working life for employees in a rapidly digitising economy.
Ping Identity releases capabilities framework for zero trust deployments
The Ping Identity model provides numerous starting points for architecting Zero Trust security.
A10 Networks adds zero-day automated protection (ZAP) to DDoS Defence
Today’s DDoS attacks are more prevalent, multi-vector in nature and morph over time.
Companies struggling with hybrid IT and zero trust controls – Pulse Secure
61% of IT organisations have little to modest confidence to mitigate access security threats, despite a majority significantly increasing their near-term budget.
Forget endpoints—it’s time to secure people instead
Security used to be much simpler: employees would log in to their PC at the beginning of the working day and log off at the end. That PC wasn’t going anywhere, as it was way too heavy to lug around.
Trust without visibility is blind – Avi Networks
Enterprises are wanting to gain the trust of their customers, but are often found blindly defending themselves.
Four steps to Zero Trust network security - AlgoSec
The core principles of zero trust reflect the reality of today’s complex, heterogenous enterprise network environments.
Ping Identity CTO’s cybersecurity predictions for 2019
“Our borderless world provides unprecedented freedom and convenience, but also breeds a whole new set of cybersecurity risks and concerns.”
Stronger security needed before open banking arrives - Okta
As early as July 2019, Australian banks will need to have a system in place that both benefits customers and protects their personal data.
Why total visibility is the key to zero trust
Over time, the basic zero trust model has evolved and matured into what Forrester calls the Zero Trust eXtended (ZTX) Ecosystem.
Why endpoint security is critical in a post-perimeter era
Traditional perimeter-based security strategies – once the backbone of enterprise security – simply no longer apply.