SASE
SASE | News, how-tos, features, reviews, and videos
Palo Alto adds new SaaS compliance, threat prevention, URL filtering features to Prisma solution
Cybersecurity vendor updates Prisma solution to help customers address increasing SaaS security challenges, along with detecting and preventing phishing, ransomware, and C2 attacks.
Cato Networks launches SSE system with customizable DLP capabilities
Cato SSE 360 provides a security service edge offering that includes DLP (data loss prevention) features based on customizable rules.
Exium expands SASE, 5G-based security for midsize enterprise networks
The on-premises module offers new capabilities, based on 5G standards, for midsize businesses.
Cato Networks introduces device context-driven access control to tackle remote working and BYOD risks
A risk-based approach restricts access to specific resources and capabilities within applications.
Windstream Enterprise launches managed SASE with Cato Networks
The bundling of Cato's SASE technology with Windstream Enterprise’s managed services is designed to enable the deployment of a wide range of networking and security capabilities across locations, users, and applications.
Forcepoint One combines zero trust and SASE under a single umbrella
Forcepoint introduces a single security platform as an alternative to a best-of-breed approach.
The 3 biggest challenges of SASE in hybrid cloud environments
Tool sprawl, inadequate cooperation between network and security teams, or lack of trust can derail SASE adoption in hybrid cloud environments.
6 zero trust myths and misconceptions
If you’ve fallen for one of these myths, you may need to rethink your zero trust strategy.
video
Get up to speed on SASE: What's driving demand and how providers' capabilities differ
As enterprises build up their mobile, edge and cloud deployments, they're being challenged to deliver a more efficient, scalable network-security architecture. Secure access service edge (SASE) is the convergence of security and...
Securing the edge: 4 trends to watch
The global COVID-19 pandemic exacerbated some of the security risks associated with the move to a more distributed computing model. Here are 4 ways security organizations are responding as edge computing threats evolve.
5 steps toward real zero trust security
Looking to advance in your zero trust journey? These steps will keep your strategy on track.
video
WAN evolution: From SD-WAN to Secure Access Service Edge (SASE)
Join IDC analysts Brandon Butler and Christopher Rodriguez as they talk with Network World’s Ann Bednarz about the SASE model for streamlining network access and improving security. Deployed as a cloud service, it blends SD-WAN’s...
Tech Primer
What it takes to become an information assurance analyst
This in-demand role calls for a rare combination of superior communication skills and security chops. Learn how one information assurance analyst landed his current job, the skills and training that helped him get there, and where his...
Tech Primer
Fraud prevention: Improving internal controls
Internal fraud controls aren't fire-and-forget. Smart collaboration and ongoing improvement will help keep fraud in check. Here are the basics.
Tech Primer
How to write an information security policy
Learn the critical first step, why consensus is key, what to cover and how make your information security policy — and program — effective.
Tech Primer
Red team versus blue team: How to run an effective simulation
Playing the role of an attacker can make your team better at defense. Learn how in our step-by-step guide to war gaming your security infrastructure — from involving the right people to weighing a hypothetical vs. live event.
Tech Primer
How to survive (and thrive) in the CISO hot seat
The CISO role is more varied and more pressure-filled than ever. CSO Online looks at how you can be successful in a post where security incidents and management feuds can cost you your job.
eBook
Special report: platforms play big in the cloud
This latest report in our C-Suite 360 series takes a full-spectrum look at the opportunities and risks in cloud computing, offering up the expert information your organization needs to set its cloud strategy.