Blog

Thought leadership and musings on security topics
How to Replace Your SSH Bastion Host

How to Replace Your SSH Bastion Host

Solve bastion challenges with Banyan Security – and deploy in minutes Historically, bastion hosts were helpful to those trying to encrypt communications in a secure channel over the public internet. SSH was the best way to run ...
Tracking Your Zero Trust Journey

Tracking Your Zero Trust Journey

Many organizations across the globe began implementing Zero Trust capabilities in 2020. With the Solar Winds attack serving as yet another security wake up call, the Zero Trust philosophy is top of mind for most CIOs and CSOs. As they ...
Introducing Banyan App 2.0

Introducing Banyan App 2.0

Enhanced desktop functionality delivers even quicker infrastructure access Organizations leverage Banyan’s desktop app as a critical piece of their Zero Trust implementation. From Device Trust to one-click service access, the Banyan ...
Blog: Banyan @ Banyan Part II – Protecting R&D

Blog: Banyan @ Banyan Part II – Protecting R&D

This is the second in a series of blogs on dogfooding your own product. The first in this series covered how we approached compliance, and in this one we’ll look at how we went about protecting other critical R&D assets. In later ...