Entries by Dean Lombardo

A Zero Trust Secure Access Service Edge for a Distributed Data World

You might call it ‘living on the edge.’ A growing number of organizations are moving computing out of the data center, out to the edge of the network. The various reasons for this include increasing numbers of mobile devices and remote users requiring access, expanding digital opportunities, cloud adoption, reduction of network latency and backhaul […]

Easy, Advanced Security Orchestration for Business Growth and Workforce Distribution

Digitally transforming organizations have to support increasingly distributed business workforces. This saddles IT teams with a balancing act of providing Internet access, enterprise-network connectivity, and assuring that the resulting network traffic doesn’t contaminate private channels and expose sensitive data. New offices are opening, the deployment clock is ticking, and IT personnel has to mobilize to […]

How Sassy (SASE) Is Your Network?

Four Steps Toward Securing Your Digital Transformation The term SASE, pronounced ‘sassy,’ is kind of cute, isn’t it? But secure access service edge (SASE) is a serious focus for organizations seeking to protect their data in the cloud, across the Internet, and within private networks. In its Research Note, “The Future of Network Security Is […]

Can In-House Cybersecurity Expertise Grow Under Cloud Coverage?

The overwhelming consensus: There’s a cybersecurity skills shortage. Some surveys have identified the cybersecurity skills gap in slightly more than half of surveyed companies, while other studies calculated the deficit higher and more dire, with those lacking cybersecurity expertise registering in the high-sixties or seventies percentile. Why is this important? In a survey, ESG found […]

SECaaS: How Cybersecurity-as-a-Service Can Enhance Coverage; Shrinks Costs

In our digital world, we tend to talk about the cloud, automation and virtualization as if every business professional and organization is consciously adopting virtual assets and deeply indoctrinated and invested in these technologies. Let’s face it… the cloud and virtual machines (cloud-hosted computers, databases and servers) are predominantly a large-enterprise, high-tech or platform-provider perspective […]

The Virtual Private Network Is Dead Again? Not so fast…

Regardless of what you call it, the VPN concept remains crux in your defensive blueprint for secure Internet access. The virtual private network (VPN), which must have more lives than a cat, has reportedly died again, and according to some industry prognosticators and influencers, VPN is now a bad word. It’s a term to be […]

Cyber Risk Management: Avoiding Business Disruption as You Digitally Transform

What is cyber risk management? For too many budget-restricted small-to-midsize enterprises, cyber risk management means trying to protect the network and datacenter by establishing antivirus and firewall security safeguards against known attack vectors and across known parts of the network. But cyberattacks are getting more technologically advanced, and malware and social engineering ploys regularly slip […]