Articles by Ashur Kanoon

VPNaaS 101: Part 2 – VPNaaS Tunnel Demo

In this 5-minute video blog, Ashur Kanoon takes us through VPN as-a-service (VPNaaS); see how easy it is from configuration to deployment in our VPNaaS tunnel demo. [transcript] Welcome to the Banyan Security VPNaaS demo. In this demo, you’ll see from deployment...

VPNaaS 101: Part 1 – Migrating to VPNaaS

Let’s look at migrating to VPNaaS (VPN as a Service) and examine the benefits and considerations for migration. Watch Ashur Kanoon below as he demonstrates the key factors you should be keeping in mind (plus considerations other vendors might hide). [transcript] So...

Sneaky Tricks in Enterprise Pricing

How much something costs has been a historical source of tension and irritation for consumers when buying stuff. We’ve all been there – not getting straight answers when trying to buy a car, finding out that your new no-fee credit card has all kinds of penalties and...

What use cases can be solved by ZNTA?

“Zero Trust” is a cybersecurity framework and philosophy that assumes no user, device, or network can be inherently trusted. Instead, it requires the verification of every user and device attempting to access resources on a network, regardless of their location,...

Life after LastPass

Last year in 2022, there were 1,802 data compromises affecting more than 422 million people – but the LastPass data breach is the one that has security practitioners chatting. The original incident happened in August of 2022. Initially, we were told it was a “minor”...

The Self-Service Security Payday

The idea of customer self-service has been around since 1833 when Percival Everett’s first self-service vending machines appeared in London, selling postcards. But when it comes to IT, many organizations find self-service daunting (though they agree it can be a path...

VPN Alternatives

Virtual Private Networks (VPN) have been widely used as a solution for secure remote access for decades. However, as organizations have come to rely more fully on remote access as a strategic part of their business, legacy VPNs have been showing their evident...

Internet Threat Protection Advanced Functionality

Protecting users against malicious sites and enabling acceptable use policy (AUP) may be accomplished using some basic tools, however, modern organizations don’t have the resources or time to discover, track, and analyze millions of domains. Banyan Security’s Internet...

Preventing Spoofed Domains

So you’re in charge of your organization’s DNS and hybrid access, and part of the job is providing DNS records to make systems easily accessible but you also need to make sure that you’re preventing spoofed domains, which can lead to a security breach. The first...