Improving Legacy Technology

We can all be thankful for so much of what’s going on this Thanksgiving. Very important things like good health, family and friends, and so much more. We can also be thankful for some of the stuff that we need to use every day to do our jobs and just get by in this tech-connected […]

Zero Trust incorporates many security principles, and assessing device trust by using device identity and posture is one of them. So how is this done and what are some of the frameworks to keep in mind? While the concepts of device identity and device posture assessments have been around for many years, it really started […]

In this multi-part series, we’ll look at what organizations can do to better improve corporate security as part of October’s Cybersecurity Awareness Month. In this blog, our focus is on multi-factor authentication (MFA). Believe it or not, computers in the old days didn’t even require passwords to get in. The threat wasn’t obvious since computers […]

Let’s look at some of the leading vendors of well-known legacy VPN products and compare them to Banyan Security’s Zero Trust Network Access (ZTNA) solution featuring Service Tunnel. Limits of legacy VPN deployments Vendor Product Cisco ASA / AnyConnect Palo Alto Networks GlobalProtect Ivanti (Pulse Secure) Pulse Connect Secure Check Point Software Technologies Quantum VPN […]

Internet Protocol Security (IPsec) was introduced in the 1990s and is the traditional site-to-site Virtual Private network (VPN) method. It was also initially used for remote access VPN but proved difficult to deploy since key distribution was needed, and managing the access-control lists (ACLs) was a pain. IPsec is deployed point to point or hub […]

Remote Access VPNs have been around for over 20 years. Having worked in this space for a long time, I know the early evolution was fast. We went from dedicated concentrators to beefier appliances with crypto accelerators to integrated functionality in next-generation firewalls (NGFW) running custom ASICs (application-specific integrated circuits). Then the evolution seemed to […]

By now, you’ve surely heard about some of the breaches that have been happening when company A gets illegally accessed via threat actors hacking into one of company A’s vendors. Microsoft was breached when hackers got into SolarWinds. Twilio was recently breached when hackers were able to hack Okta. Learn more about what exactly happened, […]