Blog

Digital transformation and the modern workforce posed unique challenges for cybersecurity, but the COVID-19 pandemic caused a seismic shift in the way businesses operate, with many organizations embracing remote work as a necessary response to the pandemic. Now that the pandemic is waning, businesses are faced with the decision of whether to force employees back […]

If it were an arm-wrestling match, it’s possible that Secure Access Service Edge (SASE) would beat Security Service Edge (SSE) if measured by bulk force alone. But if you’ve ever watched arm-wrestling (or any kind of wrestling), sometimes power and agility count for more than size and weight. In fact, in the last quarter of 2022, SSEs […]

How much something costs has been a historical source of tension and irritation for consumers when buying stuff. We’ve all been there – not getting straight answers when trying to buy a car, finding out that your new no-fee credit card has all kinds of penalties and fees when you accidentally miss a payment, reserving […]

Oh, network-centered security. What a brilliant idea. Let’s put all our faith in the network and forget about those pesky little devices that connect to it. Who needs to worry about laptops, tablets, and smartphones, anyway? They’re just small, insignificant pieces of technology that have absolutely no bearing on our security. Device-centricity? Maybe it’s a […]

Compare sitting at a desk today to sitting at a desk five or ten years ago; the way we work and access information has drastically changed. Employees may or may not be at their desks in a centralized office, working on desktop computers connected to a secure network. Instead, they work from multiple locations using […]

The CASB, or Cloud Access Security Broker, was born out of necessity in response to the rapid increase in use of cloud-based services and SaaS applications. Traditionally, organizations have protected their on-premises sensitive data with a combination of enterprise firewalls, identity, and access control solutions. However, those solutions can’t be used when the data lives […]

It’s widely recognized that change is a universal constant and nowhere has that been more apparent than in the dramatic changes we’ve seen over the last few years in the composition, complexity, and potential of the modern workforce. We now take for granted that our workforce needs to be able to securely access applications, resources, […]

We shared an overview of Banyan Security’s latest product offering, a Security Service Edge composed of: ZTNA (Zero Trust Network Access), SWG (Secure Web Gateway), CASB (Cloud Access Security Broker) and VPNaaS (VPN-as-a-Service) with Chase Cunningham, a.k.a. Dr. Zero Trust and asked him to give us his thoughts. Below you will find a video of […]

As the world continues to evolve and adopt new technologies, the modern workforce has changed significantly, and so have the opportunities and challenges that come with it. The advent of mobile devices, combined with the explosion of SaaS (software-as-a-service) apps had already dramatically altered the attack surface, but the Covid pandemic and the shift to […]

“Zero Trust” is a cybersecurity framework and philosophy that assumes no user, device, or network can be inherently trusted. Instead, it requires the verification of every user and device attempting to access resources on a network, regardless of their location, whether they are inside or outside the organization’s perimeter. Zero Trust Network Access (or ZTNA) […]

It’s pronounced “swig” and it’s definitely a cybersecurity cocktail: secure web gateways are a mix of tools specifically designed to protect users and their devices while browsing the internet. If you ask Gartner, a secure web gateway must contain: URL filtering, malicious code detection and filtering, and application control for cloud apps like Microsoft 365. […]