Blog

Threat Management In The Cloud

This month we are sharing a blog from our partner Netskope who explain the current threat trends in the cloud.

Bad actors are constantly looking for new ways to attack the enterprise. There are many known patterns of execution that are still very effective such as phishing, BEC scams, vulnerability searches on exposed websites/systems, lack of hardened systems, and misconfigurations left unaddressed/unscreened before releasing to production, leaving company’s assets exposed.

more →

Blog

Why you need to protect your VPN from a DDoS attack

As a result of the COVID-19 pandemic, many organizations find themselves rushing to meet the sudden increase in Remote Access VPN (RA-VPN) traffic as many employees are choosing to (or have been asked to) work from home. Unfortunately, this also offers opportunities for malicious attackers to launch attacks on the VPN infrastructure at a time when they know the impact will be most felt.

more →

Blog

Do SD-WANs Offer More Than A Pipe Dream?

Andy Powell

Are SD-WANs a real benefit for businesses?

Ten years ago, WANs based on MPLS were sold on the basis of saving customers from the complexity of Internet VPNs. Network providers promised simplicity, security, agility, and efficiency. Today, WANs based on Software-Defined Networking techniques (SD-WANs) are being promoted as being able to solve the inherent complexity in MPLS networks.

more →

Blog

Zero Trust – Are VPNs A Thing Of The Past?

In a business world that is facing an ever-increasing and intensifying threat landscape, enterprises must re-evaluate their current perimeter security approach. This month we are sharing a blog from one of the pioneers of the “Zero Trust” mentality, Akamai. We take a look at how VPNs are out of date and why we should all be adopting the ‘never trust, always verify’

more →

Blog

Say Goodbye To Moats And Castles With A New Approach To Remote Application Access

This month we share an insight from our technology partner Akamai. We look at how traditional remote application access methods such as VPNs, RDP, and proxies are becoming outdated. It is time to adopt a simple and uncluttered approach.

We are all familiar with the enterprise security approach of treating an organization like a castle, and protecting it with a moat.

more →