Secure Identity Defined Networking 5-Minute Explainer

Jay Sawyer profile picture

Jay Sawyer

Security Architect

Thursday, June 28, 2018

We’ve heard it all before, right?

Headliners of network breaches of compromised financial and personally identifiable information. Cloud security challenges like securing unmanaged traffic, user bypass, IoT devices, and how to ensure data workflow resiliency? Then there are decisions like going with...

Who Says Network Security and Business Agility Can’t Get Along?

Jeff Hussey profile picture

Jeff Hussey

President, CEO and Co-Founder

Thursday, June 14, 2018

Business professionals outside of IT demand business agility. It’s the current buzzword and has a nice ring… business agility! If you’re in IT, however, you’ve likely come to loathe the word. It’s very meaning conflicts with your need for tight security in the face of growing threats. Business...