When you’re trying to configure a tunnel, you want to make sure that it’s as specific and granular as possible to ensure least-privilege access. This 3-minute demo covers basic tunnel discovery and configuration to get your VPNaaS up and running as quickly as possible.
In this 5-minute video blog, Ashur Kanoon takes us through VPN as-a-service (VPNaaS); see how easy it is from configuration to deployment in this short VPNaaS tunnel demo.
So what is VPNaaS? It’s VPN as-a-service: a VPN that’s hosted without having to deploy traditional VPN appliances. This blog covers the benefits and considerations of migrating to VPNaaS, like cost, flexibility, and scalability.
Let’s keep this super-simple: the devil is in the details in any disclosure policy. If you go to the OpenAI ChatGPT FAQ, there are a few points that should raise the eyebrows of any security engineer trying to protect company data and access. To that purpose, at the end of this blog, you’ll find three […]
Corporate employees are often required to do work that involves using publicly-accessible resources (e.g., Salesforce or a staging website), which go beyond the bounds of private network control. In light of the need to connect their workforce to these public SaaS applications, many organizations recognize the need for better security, visibility, and flexibility than legacy […]
With Black Friday and Cyber Monday out of the way and the holidays right around the corner, IT folks are preparing to get the usual “new device” calls and helpdesk tickets. With over $9B spent on Black Friday itself, you can pretty much guarantee some of your co-workers got a new computer or mobile device. […]
Remote Desktop Protocol (RDP) is a proprietary protocol developed by Microsoft which provides a user with a graphical interface to connect to a Windows-based computer over a network connection. The user employs RDP client software for this purpose, while the other computer must run RDP server software. Browser-based access is also supported, eliminating the need […]
How do system admins protect their company’s sensitive data, which is hosted in multiple environments and accessed by employees and contractors in changing locations? This is what Banyan’s ZTNA solution allows admins to do. And now, we’ve made it even easier for admins by streamlining the steps required to install the brain of our ZTNA […]
It’s been almost 3 years since the world changed and everyone learned what a pandemic is. Students were told to stay home, and school district IT teams were trying to figure out how to get everyone together so that learning continued. With kids at home, working parents now had to be home. While some organizations […]
What’s vendor lock-in? Vendor lock-in refers to your inability to easily switch from one vendor’s service or products to another’s. A quick reality check I’ve spent 25+ years as a practitioner and during that time I was responsible for delivering services to over 150,000 users across several companies and industries. Around a year ago I […]
Banyan looks at why keeping software updated on all devices is critical for corporate cybersecurity.
Cybersecurity Awareness Month, October 2022 – Recognize and Report Phishing