新皇冠体育盘口

Zero Trust

新皇冠体育盘口A network security architecture that relies on authenticating all users and verifying all devices before granting access to resources, regardless of where any of the latter may be located, and which relies on micro-segmentation to grant access to only those specific resources to which users are permitted according to policy.


M&A Insight

新皇冠体育盘口2020 Tech M&A Outlook: Information Security

Last year, overall information security (infosec) M&A was up for the fourth straight year to a total of 141 deals, which eclipsed the all-time record of 132 transactions set in 2015 and was up from 131 acquisitions in 2018.

Voice of the Enterprise

Information Security, Workloads and Key Projects 2019

Market Insight

新皇冠体育盘口Microsoft Ignite: Security takes Center Stage – Identity as the New Control Plane

Within security, Microsoft has a unique opportunity: Windows is ubiquitous on endpoints, Office 365 is an equally ubiquitous productivity suite, capabilities from Exchange to the Power portfolio add to its enterprise presence, and Azure has become a major contender among cloud providers.

Market Insight

A Primer on Quantum Security

新皇冠体育盘口Quantum key distribution guarantees the secure transmission of a key, but it is still susceptible to other attacks – if an unauthenticated malicious caller rings the holder of the key, for example, and persuades the holder to email it to them, the benefit of quantum technology goes out the window.

Technology & Business Insight

Beyond the Perimeter - From ‘Zero Trust’ to ‘Unified Access Control’

Historically, the fundamental security model was to erect a ‘perimeter’ around the corporate network and assume anyone inside was ‘trusted’ and anyone on the outside was ‘untrusted.’ Cue worn out security clichés and metaphors: ‘crunchy on the outside, soft and chewy on the inside,’ ‘moat and castle,’ among others.

Market Insight

One Step Beyond: Cisco Picks Up MFA Leader DUO Security to Further its Zero-Trust Vision

新皇冠体育盘口We predicted that it was only a matter of time before network security vendors added identity management capabilities to combat both the eroding network perimeter as well as the existential threat to their established VPN and network security businesses posed by new innovations such as zero trust and software-defined networking (SDN).