by Garrett Bekker | Apr 13, 2020 | Blog
Deciphering NIST Guidelines to replace your legacy VPN and deliver secure remote access. The world of Secure Remote Access has changed It’s almost become a cliché to say that cloud computing is growing, and there are numerous stats available that confirm the rapid...
by Garrett Bekker | Oct 10, 2019 | Blog
For much of its short history, information security has been dominated by a perimeter-based network security model that essentially assumes that anyone inside the corporate network boundary was ‘trusted’ and anyone on the outside was ‘untrusted.’ This notion of trust...