The intent with SSE is that critical services are provided from one elegantly unified platform, and are the building blocks on which organizations can design a SASE architecture and fully deliver on the promises of cloud and digital transformation.more →
activereach and Cybereason are dedicated to teaming with Defenders to end attacks on the endpoint, across the enterprise, to everywhere the battle is taking placemore →
Those of you that are frequent readers of our blogs will know that we often talk about what a prime target financial services are for cyber crime. According to Forbes, cyberattacks cost financial institutions more to address than in any other industries.
In this blog we are going to look at why financial services need micro-segmentation.more →
New BlueField DPU lineup and DOCA SDK push the boundaries of zero-trust protection; Check Point Software partnership to take on IoT security.
Cloud-minded enterprises face a number of challenges: From hybrid cloud architectures and infrastructure virtualization to multiple levels of attacks and a lack of visibility. Complex issues like these limit an enterprise’s ability to implement effective security strategies.more →
Data privacy in cyber-security is a hugely regulated sector. New regulations such as the California Consumer Privacy Act (CCPA) and the EU’s General Data Protection Regulation (GDPR) have added to the list of compliance mandates that already included PCI-DSS for financial data and HIPAA for patient information.more →
Traditional Perimeter Methods Are Not Enough
For organisations with perimeter-based security, a breach gives malicious actors access to your entire network, enabling them to move laterally to wherever they want as soon as they breach defences. This security model sees all applications and data equally and therefore security and access is the same for everything.more →
activereach Ltd work in partnership with Netskope for their customers, large and small, who are seeing the cost and business benefits of moving to a cloud-native control point, with the security posture and risk management tools they need.
It is understandable to have questions and want clarity about SASE (secure access secure edge) as a concept.more →
In 2020, breaches were the digital pandemic. Cybercriminals were provided with the opportunity to disrupt and target the weak areas of organizations that were not prepared to work remotely securely.
It is certainly true to say that we are all glad to see the back of 2020. But not withstanding these difficult and challenging times, what does the cybersecurity landscape look like in 2021?more →