Blog

Micro-segmentation and the Zero Trust Model

Traditional Perimeter Methods Are Not Enough

For organisations with perimeter-based security, a breach gives malicious actors access to your entire network, enabling them to move laterally to wherever they want as soon as they breach defences.  This security model sees all applications and data equally and therefore security and access is the same for everything. 

more →

Blog

Zero Trust – Are VPNs A Thing Of The Past?

In a business world that is facing an ever-increasing and intensifying threat landscape, enterprises must re-evaluate their current perimeter security approach. This month we are sharing a blog from one of the pioneers of the “Zero Trust” mentality, Akamai. We take a look at how VPNs are out of date and why we should all be adopting the ‘never trust, always verify’

more →