by John Bruggeman | Oct 12, 2023 | Security
What is zero trust architecture, and why is implementing it essential to secure your organization’s data? We must first understand the traditional security architecture model to answer that question. The legacy “castle and moat” model is where you...
by Neal Marksberry | Sep 21, 2023 | Communications, Digital Workplace, Security
Unified Communications as a Service (UCaaS) solutions merge collaboration platforms like Cisco Webex Calling or Microsoft Teams Voice with cloud telephony. Based on these trends, it’s a safe bet that, eventually, most companies will utilize the benefits of UCaaS...
by Suman Jillella | Sep 7, 2023 | Security
Application modernization is critical to surmounting the vulnerabilities of legacy applications and systems. But app modernization efforts introduce their own set of security obstacles. Application modernization is both a boon and a hurdle to network and information...
by John Bruggeman | Aug 24, 2023 | Security
What exactly is zero trust architecture (ZTA)? In a nutshell, zero trust is a security philosophy based on replacing the outdated “castle-and-moat” cybersecurity model. The “hard on the outside, soft on the inside” approach to classical...
by Jon Lloyd | Aug 3, 2023 | Security
Secure access service edge (SASE, pronounced “sassy”) merges cloud networking and security by combining software-defined wide area networks (SD-WAN) with secure service edge (SSE) protocols. This blend of technologies streamlines overall security posture,...
by Jon Lloyd | Apr 20, 2023 | Cloud, Security
Traditionally, it has been common security practice for a company to deploy a single firewall for each branch. Legacy networks were much less complicated, with most businesses having a single edge (where devices meet the Internet). However, the shift to remote work...