What’s vendor lock-in? Vendor lock-in refers to your inability to easily switch from one vendor’s service or products to another’s. A quick reality check I’ve spent 25+ years as a practitioner and during that time I was responsible for delivering services to over 150,000 users across several companies and industries. Around a year ago I […]
Blog
Banyan Security is ecstatic to introduce phase 2 of our Granular Trust Scoring (GTS) feature set. Phase 2 includes the ability to create a Trust Profile. Trust Profiles allow an admin to assign trust factors to different groups of devices, with available assignment criteria of; user groups, serial numbers, operating systems, MDM management, and device […]
Banyan looks at why keeping software updated on all devices is critical for corporate cybersecurity.
Organizations should understand their cybersecurity implementation as compared to the tenants outlined by NIST. Here’s a look at why NIST security guidance matters to everyone.
Cybersecurity Awareness Month, October 2022 – Recognize and Report Phishing
We dive into how the use of strong passwords for Cybersecurity Awareness Month. Learn how to create a good password, and proper password hygiene.
Banyan recently announced a new granular trust scoring feature, called Trust Effect, for device trust and security posture. Here is how it works.
Zero Trust incorporates many security principles, and assessing device trust by using device identity and posture is one of them. So how is this done and what are some of the frameworks to keep in mind? While the concepts of device identity and device posture assessments have been around for many years, it really started […]
In this multi-part series, we’ll look at what organizations can do to better improve corporate security as part of October’s Cybersecurity Awareness Month. In this blog, our focus is on multi-factor authentication (MFA). Believe it or not, computers in the old days didn’t even require passwords to get in. The threat wasn’t obvious since computers […]
Let’s look at some of the leading vendors of well-known legacy VPN products and compare them to Banyan Security’s Zero Trust Network Access (ZTNA) solution featuring Service Tunnel. Limits of legacy VPN deployments Vendor Product Cisco ASA / AnyConnect Palo Alto Networks GlobalProtect Ivanti (Pulse Secure) Pulse Connect Secure Check Point Software Technologies Quantum VPN […]
We’ve made some enhancements to our self-service offering and we’re convinced that intent-based onboarding will be a leading conduit to the successful first time user experience. This post is to share more about what we did, why, and some lessons learned along the way! Great onboarding flows orient around outcomes A key goal at Banyan […]
October is Cybersecurity Awareness Month, and this year there is a renewed focus on the fact that cybersecurity is really all about people and the actions they take.