Blog

Thought leadership and musings on security topics
ZTNA and the Death of the Network Perimeter

ZTNA and the Death of the Network Perimeter

Zero trust network access (ZTNA) is becoming increasingly relevant as the concept of the network perimeter, and the traditional "castle-and-moat" mentality of cybersecurity becomes obsolete. The advent of mobile devices, Wi-Fi ...
The Self-Service Security Payday

The Self-Service Security Payday

The idea of customer self-service has been around since 1833 when Percival Everett’s first self-service vending machines appeared in London, selling postcards. But when it comes to IT, many organizations find self-service daunting ...
VPN Alternatives

VPN Alternatives

Virtual Private Networks (VPN) have been widely used as a solution for secure remote access for decades. However, as organizations have come to rely more fully on remote access as a strategic part of their business, legacy VPNs have ...
How Banyan Remediates Threats

How Banyan Remediates Threats

Introduction There’s no escaping the number of breaches occurring daily, our media is full of them. As practitioners it feels like we’re pushing rope uphill as we try to convince organizations to adopt the basic security practices ...
Internet Threat Protection Advanced Functionality

Internet Threat Protection Advanced Functionality

Protecting users against malicious sites and enabling acceptable use policy (AUP) may be accomplished using some basic tools, however, modern organizations don’t have the resources or time to discover, track, and analyze millions of ...
Preventing Spoofed Domains

Preventing Spoofed Domains

So you’re in charge of your organization’s DNS and hybrid access, and part of the job is providing DNS records to make systems easily accessible but you also need to make sure that you're preventing spoofed domains, which can lead to ...
Not All Tunnels Are Created Equally

Not All Tunnels Are Created Equally

With IPSec, SSL, TLS, VPN, SDP, and ZTNA tunnels, it may sometimes become confusing to figure when to use which. IPSec was mostly used for site-to-site VPN and we’re going to focus on remote access. Clearly, there are different types ...
VPN vs Zero Trust

VPN vs Zero Trust

VPNs, or Virtual Private Networks, have been around for quite some time. But in their legacy form, remote access VPNs are not the safest security solution in this post-COVID, work-from-anywhere, hybrid work environment we live in ...