Blog

Common Security Practices Don’t Fully Protect Today’s Enterprise SaaS Platforms

Enterprises are investing in SaaS at a record high with Gartner estimating that 95 percent of new enterprise applications purchases are cloud-based. At the same time, SaaS products are rapidly evolving to play an ever larger role in the enterprise. What were relatively simple applications just a few years ago have quickly morphed into complex platforms – some might even say a new breed of business operating system.

more →

Blog

How 3rd Party Apps Can Compromise The Security of SaaS Environments

 

Risk of 3rd party applications has always been a concern for security teams. The SolarWinds breach is an example of a 3rd party application inserting a vulnerability into an otherwise secure infrastructure. While the SolarWinds breach occurred in an on-premise environment, 3rd party apps can also create vulnerabilities in SaaS environments.

more →

Blog

Will AI Take Over My Job?

Over the past couple of decades, since the birth of the web, automation of business processes has progressed at an exponential rate. Responding to public demand for services to be immediately available has been the difference between businesses thriving, or shutting down. One of the latest tools in the drive for organizations to automate and improve has been the recent impacts of machine learning techniques, known collectively (if incorrectly) as “Artificial Intelligence” or AI.

more →

Blog

Say Goodbye To Moats And Castles With A New Approach To Remote Application Access

This month we share an insight from our technology partner Akamai. We look at how traditional remote application access methods such as VPNs, RDP, and proxies are becoming outdated. It is time to adopt a simple and uncluttered approach.

We are all familiar with the enterprise security approach of treating an organization like a castle, and protecting it with a moat.

more →

Blog

Third-Party and Remote Enterprise Application Access Needs to Evolve

This month we share a guest blog article on enterprise application security from technology partner Akamai, highlighting the challenges of dealing with third party access to applications hosted in data centres and hybrid cloud environments.

As we know, enterprises have come a long way from the days when a few remote users needed access to a handful of applications.

more →