Use cases

Banyan Security is ecstatic to introduce phase 2 of our Granular Trust Scoring (GTS) feature set. Phase 2 includes the ability to create a Trust Profile. Trust Profiles allow an admin to assign trust factors to different groups of devices, with available assignment criteria of; user groups, serial numbers, operating systems, MDM management, and device […]

Internet Protocol Security (IPsec) was introduced in the 1990s and is the traditional site-to-site Virtual Private network (VPN) method. It was also initially used for remote access VPN but proved difficult to deploy since key distribution was needed, and managing the access-control lists (ACLs) was a pain. IPsec is deployed point to point or hub […]

Banyan Security’s Zero Trust Network Access (ZTNA) solution provides critical protections for a large number of these important HIPAA safeguards.

Each year, parents assemble a backpack chock full of all the stuff kids need to return to school and be successful. Required books, pens, pencils, pencil box, ruled notebooks, lunchbox (with lunch! ;-)), extra jacket/hoodie, hat, etc. Obviously the content varies depending on their age, but the process is pretty consistent. Now, as I think […]

While the idea of enabling zero trust network access (ZTNA) without needing to install new client or agent software across endpoints sounds great from a deployment, management, and training perspective, the reality is that major compromises come with this approach. As an admin entrusted with providing the highest security and best user experience, understanding these […]