The four factors to consider when selecting a VPN for travel

July 24, 2019 | 103 views

A VPN can give travelers a much-needed extra layer of cybersecurity and make it easier for them to access censored or geo-blocked content. This article covers the factors you should look at when choosing a VPN for your vacation.While a secure, trustworthy VPN is always a useful tool to protect your online activity, travelers can benefit all the more from a VPN because of the situations they regularly face. Whether connecting to public WiFi or trying to access geo-blocked content from back home, a VPN helps keep your connection secure and unblock websites. With that in mind, there are specific criteria you should look at when choosing a VPN for travel.

Spotlight

Pivotal IT

We take the time to fully understand the needs of your organization, not just your technology - in order to provide customized solutions, service and support. Dont let technical issues slow down your operations - Pivotal ITs Managed Services provide peace of mind at a predictable cost.

OTHER ARTICLES
SERVER HYPERVISORS

Network Virtualization: The Future of Businesses and Networks

Article | September 9, 2022

Network virtualization has emerged as the widely recommended solution for the networking paradigm's future. Virtualization has the potential to revolutionize networks in addition to providing a cost-effective, flexible, and secure means of communication. Network virtualization isn't an all-or-nothing concept. It can help several organizations with differing requirements, or it can provide a bunch of new advantages for a single enterprise. It is the process of combining a network's physical hardware into a single, virtual network. This is often accomplished by running several virtual guest machines in software containers on a single physical host system. Network virtualization is indeed the new gold standard for networking, and it is being embraced by enterprises of all kinds globally. By integrating their current network gear into a single virtual network, businesses can reduce operating expenses, automate network and security processes, and lay the groundwork for future growth. Network virtualization also enables organizations to simulate traditional hardware like servers, storage devices, and network resources. The physical network performs basic tasks like packet forwarding, while virtual versions handle more complex activities like networking service management and deployment. Addressing Network Virtualization Challenges Surprisingly, IT teams might encounter network virtualization challenges that are both technical and non-technical in nature. Let's look at some common challenges and discuss how to overcome them. Change in Network Architecture Practically, the first big challenge is shifting from an architecture that depends heavily on routers, switches, and firewalls. Instead, these services are detached from conventional hardware and put on hypervisors that virtualize these operations. Virtualized network services are shared, scaled, and moved as required. Migrating current LANs and data centers to a virtualized platform require careful planning. This migration involves the following tasks: Determine how much CPU, computation, and storage resources will be required to run virtualized network services. Determine the optimal approach for integrating network resilience and security services. Determine how the virtualized network services will be implemented in stages to avoid disrupting business operations. The key to a successful migration is meticulous preparation by architects who understand the business's network requirements. This involves a thorough examination of existing apps and services, as well as a clear knowledge of how data should move across the company most effectively. Moreover, a progressive approach to relocation is often the best solution. In this instance, IT teams can make changes to the virtualization platform without disrupting the whole corporate network. Network Visibility Network virtualization has the potential to considerably expand the number of logical technology layers that must collaborate. As a result, traditional network and data center monitoring technologies no longer have insight into some of these abstracted levels. In other circumstances, visibility can be established, but the tools fail to show the information correctly so that network operators can understand it. In either case, deploying and managing modern network visibility technologies is typically the best choice. When an issue arises, NetOps personnel are notified of the specific service layer. Automation and AI The enhanced level of automation and self-service operations that can be built into a platform is a fundamental aspect of network virtualization. While these activities can considerably increase the pace of network upgrades while decreasing management overhead, they need the documentation and implementation of a new set of standards and practices. Understand that prior network architectures were planned and implemented utilizing actual hardware appliances on a hop-by-hop basis. A virtualized network, on the other hand, employs a centralized control plane to govern and push policies to all sections of the network. Changes may occur more quickly in this aspect, but various components must be coordinated to accomplish their roles in harmony. As a result, network teams should move their attention away from network operations that are already automated. Rather, their new responsibility is to guarantee that the core automation processes and AI are in sync in order to fulfill those automated tasks. Driving Competitive Edge with Network Virtualization Virtualization in networking or virtual machines within an organization is not a new trend. Even small and medium businesses have realized the benefits of network virtualization, especially when combined with a hosted cloud service provider. Because of this, the demand for enterprise network virtualization is rising, driving higher end-user demands and the proliferation of devices and business tools. These network virtualization benefits can help boost business growth and gain a competitive edge. Gaining a Competitive Edge: Network Virtualization Benefits Cost-Savings on Hardware Faster Desktop and Server Provisioning and Deployment Improved Data Security and Disaster Recovery Increasing IT Operational Efficiency Small Footprint and Energy Saving Network Virtualization: The Path to Digital Transformation Business is at the center of digital transformation, but technology is needed to make it happen. Integrated clouds, highly modern data centers, digital workplaces, and increased data center security are all puzzle pieces, and putting them all together requires a variety of various products and services that are deployed cohesively. The cloud revolution is still having an influence on IT, transforming how digital content is consumed and delivered. This should come as no surprise that such a shift has influenced how we feel about current networking. When it boils down to it, the purpose of digital transformation for every company, irrespective of industry, is the same: to boost the speed with which you can respond to market changes and evolving business needs; to enhance your ability to embrace and adapt to new technology, and to improve overall security. As businesses realize that the underlying benefit of cloud adoption and enhanced virtualization isn't simply about cost savings, digital strategies are evolving, becoming more intelligent and successful in the process. Network virtualization is also a path toward the smooth digital transformation of any business. How does virtualization help in accelerating digital transformation? Combining public and private clouds, involving hardware-based computing, storage, and networking software definition. A hyper-converged infrastructure that integrates unified management with virtualized computing, storage, and networking could be included. Creating a platform for greater productivity by providing the apps and services consumers require when and when they utilize them. This should include simplifying application access and administration as well as unifying endpoint management. Improving network security and enhancing security flexibility to guarantee that quicker speed to market is matched by tighter security. Virtualization will also help businesses to move more quickly and safely, bringing products—and profits—to market faster. Enhancing Security with Network Virtualization Security has evolved as an essential component of every network architecture. However, since various areas of the network are often segregated from one another, it might be challenging for network teams to design and enforce network virtualization security standards that apply to the whole network. Zero trust can integrate such network parts and their accompanying virtualization activities. Throughout the network, the zero-trust architecture depends on the user and device authentication. If LAN users wish to access data center resources, they must first be authenticated. The secure connection required for endpoints to interact safely is provided by a zero-trust environment paired with network virtualization. To facilitate these interactions, virtual networks can be ramped up and down while retaining the appropriate degree of traffic segmentation. Access policies, which govern which devices can connect with one another, are a key part of this process. If a device is allowed to access a data center resource, the policy should be understood at both the WAN and campus levels. Some of the core network virtualization security features are: Isolation and multitenancy are critical features of network virtualization. Segmentation is related to isolation; however it is utilized in a multitier virtual network. A network virtualization platform's foundation includes firewalling technologies that enable segmentation inside virtual networks. Network virtualization enables automatic provisioning and context-sharing across virtual and physical security systems. Investigating the Role of Virtualization in Cloud Computing Virtualization in the cloud computing domain refers to the development of virtual resources (such as a virtual server, virtual storage device, virtual network switch, or even a virtual operating system) from a single resource of its type that also shows up as several personal isolated resources or environments that users can use as a separate individual physical resource. Virtualization enables the benefits of cloud computing, such as ease of scaling up, security, fluid or flexible resources, and so on. If another server is necessary, a virtual server will be immediately created, and a new server will be deployed. When we need more memory, we increase the virtual server configurations we currently have, and we now have the extra RAM we need. As a result, virtualization is the underlying technology of the cloud computing business model. The Benefits of Virtualization in Cloud Computing: Efficient hardware utilization Virtualization improves availability Disaster recovery is quick and simple Energy is saved by virtualization Setup is quick and simple Cloud migration has become simple Motivating Factors for the Adoption of Network Virtualization Demand for enterprise networks continues to climb, owing to rising end-user demands and the proliferation of devices and business software. Thanks to network virtualization, IT companies are gaining the ability to respond to shifting demands and match their networking capabilities with their virtualized storage and computing resources. In fact, according to a recent SDxCentral report, 88% of respondents believe it is "important" or "mission critical" to implement a network virtualization software over the next two to five years. Virtualization is also an excellent alternative for businesses that employ outsourced IT services, are planning mergers or acquisitions or must segregate IT teams owing to regulatory compliance. Reasons to Adopt Network Virtualization: A Business Needs Speed Security Requirements Are Rising Apps can Move Around Micro-segmentation IT Automation and Orchestration Reduce Hardware Dependency and CapEx: Adopt Multi-Tenancy Cloud Disaster Recovery mproved Scalability Wrapping-Up Network virtualization and cloud computing are emerging technologies of the future. As CIOs get actively involved in organizational systems, these new concepts will be implemented in more businesses. As consumer demand for real-time services expands, businesses will be driven to explore network virtualization as the best way to take their networks to the next level. The networking future is here. FAQ Why is network virtualization important for business? By integrating their current network gear into a single virtual network, businesses can reduce operating expenses, automate network and security processes, and set the stage for future growth. Where is network virtualization used? Network virtualization can be utilized in application development and testing to simulate hardware and system software realistically. Network virtualization in application performance engineering allows for the modeling of connections among applications, services, dependencies, and end users for software testing. How does virtualization work in cloud computing? Virtualization, in short, enables cloud providers to provide users alongside existing physical computer infrastructure. As a simple and direct process, it allows cloud customers to buy only the computing resources they require when they want them and to maintain those resources cost-effectively as the demand grows.

Read More
VIRTUAL DESKTOP TOOLS

Virtualization can transform your company’s IT infrastructure

Article | July 7, 2022

For many companies in today’s highly competitive, rapidly digitizing world, data center transformation is not merely a one-time project – it’s a constant challenge. No corporate IT leader should be content merely to revamp their data infrastructure once, then call it a day. Instead, they should always be looking for ways to make their approach to data more dynamic and easier to scale. Ideally, they’d do so in a way that maximizes resource utilization while minimizing costs. Luckily, that’s exactly the idea behind virtualization, which involves creating a new infrastructure that’s capable of rapidly scaling and facilitating workload development. IT leaders are quickly coming to realize that with virtualization in their toolbox, they’re able to make their operations more agile than ever, and without increasing costs. This is why over 80% of enterprise server workloads today are running on virtual machines, and the market for data center virtualization is expected to reach a total value of $10 billion by 2023.

Read More
VIRTUAL DESKTOP STRATEGIES

Best Practices for vSphere 6.7 Tagging

Article | July 12, 2022

vSphere Tags were introduced in version 5.1 as a way to organize inventory objects such as VMs, Hosts, Datastores, etc., a much-needed feature for helping search for or group objects within vSphere. A Tag is basically a label that can be applied to vSphere inventory objects. When an administrator creates a tag, it is then assigned to a tag category. Categories allow the grouping of related tags. When a Category is created, you can specify associations of object types (such as; VM or Datastore) as well as whether more than one tag in a category can be applied to an object (ex; One Tag or Many Tags).

Read More

How to automate the creation multiple routable VLANs on single L2 network using VyOS

Article | February 12, 2020

My personal homelab has a very simple network topology, everything is connected to a single flat network. This has served me well over the years, but sometimes it can prevent me from deploying more complex scenarios. Most recently while working with NSX-T and Project Pacific, I had a need for additional VLANs which my home router does not support. There are a number of software solutions that can be used including the popular pfSense, which I have used before. Over the Winter break, a colleague introduced me to VyOS, which is another popular software firewall and router solution. I had not heard of VyOS before but later realized it was derived from Vyatta, which I had heard of, but development of that solution had stopped and VyOS is now the open source version of that software. Having never played with VyoS before, I thought this might be a good learning opopournity and started to dabble with VyOS over the holiday.

Read More

Spotlight

Pivotal IT

We take the time to fully understand the needs of your organization, not just your technology - in order to provide customized solutions, service and support. Dont let technical issues slow down your operations - Pivotal ITs Managed Services provide peace of mind at a predictable cost.

Related News

VPN

Nord Security, the umbrella company of NordVPN, joins the World Economic Forum

Nord Security | February 18, 2022

Nord Security, a family of digital privacy and security solutions, has joined the Centre for Cybersecurity, launched by the World Economic Forum. Alongside other global cybersecurity companies, Nord Security will accelerate the societal benefits of a secure digital world and participate in invaluable knowledge sharing within the sector. The World Economic Forum's Centre for Cybersecurity is an independent and impartial global platform committed to fostering international dialogues and collaboration between the global cybersecurity community in both the public and private sectors. The focal points of the center are to build cyber resilience, strengthen global cooperation, and understand future networks and technology. Nord Security joining the Centre for Cybersecurity will not only benefit the World Economic Forum and its aims, but it will also help Nord Security to further develop into an encompassing cybersecurity suite. As a global brand that has continuously advocated for greater online privacy and security, joining the World Economic Forum's Centre for Cybersecurity marks the natural next step for us and our products. Nord Security has accumulated extensive cybersecurity experience that could provide valuable insights to this platform. But more importantly, we hope that, together with other members of the center, we will further boost the users' trust and close cooperation between public and private stakeholders in the cybersecurity industry." Tom Okman, one of the co-founders of Nord Security "We are excited that Nord Security has joined the Centre for Cybersecurity. Their expertise will be a value add to ongoing projects on cyber resilience, governance and privacy," said Alexander Klimburg, head of the Centre for Cybersecurity, World Economic Forum. About NordVPN NordVPN — the first brand in the Nord Security family of products — was established in 2012. Throughout the years, it became the VPN solution of choice worldwide. Lately, the company has been expanding to include security solutions for businesses and advanced tools for consumers. These include the next-generation password manager NordPass, the powerful file encryption tool NordLocker, and the business solution NordLayer.

Read More

VPN

New Research from Knight Ink and BlastWave Provides Vital Insight to Preventing Account Take Over, VPNs are Dead

BlastWave | February 15, 2022

BlastWave, a new challenger in the software-defined perimeter (SDP) arms race designed to protect critical infrastructure assets and applications, today announced a partnership with Knight Ink, a full-service digital brand, content and experience agency for challenger brands in cybersecurity. Through the partnership, Knight Ink and BlastWave have jointly released a whitepaper to present a new approach to secure remote access that eliminates virtual private networks (VPNs) from the now defunct edge and dissolving intranet, to a new software-defined perimeter (SDP) that can prevent Account Take Over (ATO). According to the recently released whitepaper, "The Valley of Kings: SDP Rising and The Fall of VPNs," when the COVID-19 pandemic forced a shift to work-from-home environments, many organizations relied on VPNs and other remote access solutions as they were the only options they had. Many continue to deploy VPNs even though a recent survey shows, "93 percent of organizations surveyed have deployed some sort of VPN, yet 94 percent know that VPNs are a popular target for cybercriminals." The same report states 67 percent are looking at alternatives to the traditional VPN for remote access requirements. "We are seeing an exodus away from legacy VPN technology towards SDP solutions. But change is not happening fast enough. How many times must we repeat the same mistakes? Legacy VPNs are dead, much like the pharaohs who once ruled over Egypt who now lie in rest in the Valley of Kings graveyard for which the namesake of our new white paper was based. We must pave the way for the zero-trust enterprise now relying on SDP solutions to protect remote and hybrid workforces," said Alissa Knight, Cybersecurity Influencer and Partner, Knight Ink. "Our partnership with BlastWave made sense because they understand the advanced threats organizations face today. BlastWave has developed an innovative SDP solution with a unified stack combining passwordless multi-factor authentication, secure remote access, and microsegmentation that cloaks critical infrastructure." Other key findings include: When VPNs were introduced in 1996, they promised a new, more un-hackable future. 22 years later, 557 vulnerabilities are returned with the keyword VPN in the CVE database at MITRE. Software-defined microsegmentation allows organizations to create communities of assets and people that define who and what can talk to each other in a network. True to its foundation in zero-trust security, SDP obviates the idea that we should trust users, the assets they're using, and the data they're trying to access. According to Gartner "By 2023, 60 percent of enterprises will phase out most of their remote access VPNs in favor of ZTNA (SDPs). So many cyber companies are obsessed with identifying and spotting malware signatures and patterns that look anomalous. But this is a computer science focus, not a human focus. Hackers are humans who use creativity, code and tools to take over accounts, implant malware, and profit with a low risk of getting prosecuted. BlastShield shuts down the top two ways hackers go after targets, credentials and exposed web services. We also greatly reduce human error by eliminating numerous configuration steps that can create inadvertent vulnerabilities. Fundamentally, BlastWave prevents many attacks and reduces the severity of the rest through microsegmentation. Our obsession about hacking from a human perspective is what drew us to Alissa Knight in the first place, with her credentials, experience, and chutzpah badassness, she tells the story through an adversarial lens. That is the partnership origin story of why we collaborate. Together we want to challenge the way the industry thinks about secure remote access, starting with VPNs - they are not effective and must be replaced." Tom Sego, CEO and founder, BlastWave As part of the collaboration, Knight Ink in partnership with its sister company M&A Knight Studios, will create written and visual experiences for BlastWave in the form of whitepapers, videos, and episodic short films to demonstrate the business imperative of organizations moving to zero-trust network access (ZTNA) powered by BlastWave's SDP solution. BlastShield integrates three innovative products into a single, patented SDP solution that combines infrastructure, cloaking and passwordless multi-factor authentication (MFA) for identity-based secure remote network access for organizations that have adopted a zero-trust security model. BlastShield enables organizations to hide on-premises and cloud workloads from outsider and insider threats, concealing an organization's infrastructure from cyberattacks through software-defined microsegmentation, without modifications to existing network fabric and hardware. BlastWave solves the problem that traditional VPNs and other complex end-point technologies have been unable to address by applying a zero-trust software-defined perimeter throughout the network architecture, not just at the endpoint, rendering the entire network invisible. About BlastWave Founded by former executives and technologists from Apple and Cisco, BlastWave is taking a fundamentally different approach to security aimed at protecting privacy and connected devices from cyberattacks. BlastWave's patented product, BlastShield™️, is an integrated, zero-trust stack that combines state-of-the-art passwordless multi-factor authentication with high-performance, resilient encrypted connectivity and built-in microsegmentation. BlastWave is backed by Rocket Strategies, Lucas Venture Group, and Millennium Investments. The company is headquartered in Palo Alto, California. About Knight Ink Knight Ink is a content strategy, content creation, and influencer marketing agency founded for category leaders and challenger brands in cybersecurity to fill current gaps in content marketing. We will help you create and distribute your stories to the market in the form of written and visual storytelling drawn from 20+ years of experience working with global brands in cybersecurity. We are trusted advisers to cybersecurity marketing leaders to help them find their blue ocean strategy; develop their content strategy; and create the content that tells their unique story through the lens of an adversary. The content we create for our clients tells that story of efficacy through the lens of the adversary that their product protects their customers against.

Read More

VPN

Edgecore Networks’ Pocket WFA Solution Delivers Incredible Agility with Infinite Possibilities

Edgecore Networks | February 15, 2022

Edgecore Networks, a leading provider of traditional and open network solutions for enterprises, data centers, and telecommunication service providers, announced the launch of the Pocket WFA (Work-from-Anywhere) solution that is composed of two phenomenal Edgecore products – the EWS5203 WLAN gateway-controller and the SP-W2M-AC1200-WFH wireless access point. The solution aims to provide a plug-and-play, secure, agile, reliable mechanism to support businesses through the pandemic crisis and beyond. In-Pocket Agility In a world full of uncertainty, everything is about efficiency and agility. The zero-touch configuration feature of the Pocket WFA solution reduces the deployment time from days to only minutes. Enterprises can swiftly roll out remote offices, minimizing business downtime at a friendly price. Plus, the SP-W2M-AC1200-WFH access point is just palm-size and weighs only 82g, so remote workers can easily carry it wherever they work to further ensure business productivity. On top of that, to deliver a seamless working environment, the solution allows remote workers to connect to the same SSID as they would in the office for automatic connection to the company VPN, extending enterprise services to anywhere. Taking security on board, the solution supports various user authentication methods that can be easily enforced across all deployment scenarios, such as 802.1X authentication, local authentication, and two-factor authentication, ensuring the proper identification of network users before granting access to the network. Out-of-Box Possibilities The Pocket WFA solution can be deployed in various scenarios in a number of ways, such as mobile taskforce teams, branch sites, remote classrooms, and so on. The agility and affordable price enable new services and new business models that are not bound by infrastructure limitations and can embrace limitless possibilities. Organizations globally are experiencing unprecedented workforce disruption. Virtually all companies are still determining how they will work in the short and long term. The Pocket WFA solution is rising to the challenge, helping enterprises and organizations navigate workforce shifts, such as the urgent need to shift to a remote workforce to protect and empower employees, serve customers, and establish business continuity.” Teng Tai Hsu, Vice President of Edgecore Networks The Pocket WFA solution not only assists businesses to emerge from the pandemic stronger, but also opens the door to innovative business and service opportunities in the post-pandemic era. About Edgecore Edgecore Networks Corporation is a wholly owned subsidiary of Accton Technology Corporation, the leading networking ODM. Edgecore Networks delivers wired and wireless networking products and solutions through channel partners and system integrators worldwide for data center, service provider, enterprise, and SMB customers. Edgecore Networks is the leader in open networking, providing a full line of open 1G-400G Ethernet OCP-Accepted switches, core routers, cell site gateways, virtual PON OLTs, optical packet transponders, and Wi-Fi access points that offer choice of commercial and open source NOS and SDN software.

Read More

VPN

Nord Security, the umbrella company of NordVPN, joins the World Economic Forum

Nord Security | February 18, 2022

Nord Security, a family of digital privacy and security solutions, has joined the Centre for Cybersecurity, launched by the World Economic Forum. Alongside other global cybersecurity companies, Nord Security will accelerate the societal benefits of a secure digital world and participate in invaluable knowledge sharing within the sector. The World Economic Forum's Centre for Cybersecurity is an independent and impartial global platform committed to fostering international dialogues and collaboration between the global cybersecurity community in both the public and private sectors. The focal points of the center are to build cyber resilience, strengthen global cooperation, and understand future networks and technology. Nord Security joining the Centre for Cybersecurity will not only benefit the World Economic Forum and its aims, but it will also help Nord Security to further develop into an encompassing cybersecurity suite. As a global brand that has continuously advocated for greater online privacy and security, joining the World Economic Forum's Centre for Cybersecurity marks the natural next step for us and our products. Nord Security has accumulated extensive cybersecurity experience that could provide valuable insights to this platform. But more importantly, we hope that, together with other members of the center, we will further boost the users' trust and close cooperation between public and private stakeholders in the cybersecurity industry." Tom Okman, one of the co-founders of Nord Security "We are excited that Nord Security has joined the Centre for Cybersecurity. Their expertise will be a value add to ongoing projects on cyber resilience, governance and privacy," said Alexander Klimburg, head of the Centre for Cybersecurity, World Economic Forum. About NordVPN NordVPN — the first brand in the Nord Security family of products — was established in 2012. Throughout the years, it became the VPN solution of choice worldwide. Lately, the company has been expanding to include security solutions for businesses and advanced tools for consumers. These include the next-generation password manager NordPass, the powerful file encryption tool NordLocker, and the business solution NordLayer.

Read More

VPN

New Research from Knight Ink and BlastWave Provides Vital Insight to Preventing Account Take Over, VPNs are Dead

BlastWave | February 15, 2022

BlastWave, a new challenger in the software-defined perimeter (SDP) arms race designed to protect critical infrastructure assets and applications, today announced a partnership with Knight Ink, a full-service digital brand, content and experience agency for challenger brands in cybersecurity. Through the partnership, Knight Ink and BlastWave have jointly released a whitepaper to present a new approach to secure remote access that eliminates virtual private networks (VPNs) from the now defunct edge and dissolving intranet, to a new software-defined perimeter (SDP) that can prevent Account Take Over (ATO). According to the recently released whitepaper, "The Valley of Kings: SDP Rising and The Fall of VPNs," when the COVID-19 pandemic forced a shift to work-from-home environments, many organizations relied on VPNs and other remote access solutions as they were the only options they had. Many continue to deploy VPNs even though a recent survey shows, "93 percent of organizations surveyed have deployed some sort of VPN, yet 94 percent know that VPNs are a popular target for cybercriminals." The same report states 67 percent are looking at alternatives to the traditional VPN for remote access requirements. "We are seeing an exodus away from legacy VPN technology towards SDP solutions. But change is not happening fast enough. How many times must we repeat the same mistakes? Legacy VPNs are dead, much like the pharaohs who once ruled over Egypt who now lie in rest in the Valley of Kings graveyard for which the namesake of our new white paper was based. We must pave the way for the zero-trust enterprise now relying on SDP solutions to protect remote and hybrid workforces," said Alissa Knight, Cybersecurity Influencer and Partner, Knight Ink. "Our partnership with BlastWave made sense because they understand the advanced threats organizations face today. BlastWave has developed an innovative SDP solution with a unified stack combining passwordless multi-factor authentication, secure remote access, and microsegmentation that cloaks critical infrastructure." Other key findings include: When VPNs were introduced in 1996, they promised a new, more un-hackable future. 22 years later, 557 vulnerabilities are returned with the keyword VPN in the CVE database at MITRE. Software-defined microsegmentation allows organizations to create communities of assets and people that define who and what can talk to each other in a network. True to its foundation in zero-trust security, SDP obviates the idea that we should trust users, the assets they're using, and the data they're trying to access. According to Gartner "By 2023, 60 percent of enterprises will phase out most of their remote access VPNs in favor of ZTNA (SDPs). So many cyber companies are obsessed with identifying and spotting malware signatures and patterns that look anomalous. But this is a computer science focus, not a human focus. Hackers are humans who use creativity, code and tools to take over accounts, implant malware, and profit with a low risk of getting prosecuted. BlastShield shuts down the top two ways hackers go after targets, credentials and exposed web services. We also greatly reduce human error by eliminating numerous configuration steps that can create inadvertent vulnerabilities. Fundamentally, BlastWave prevents many attacks and reduces the severity of the rest through microsegmentation. Our obsession about hacking from a human perspective is what drew us to Alissa Knight in the first place, with her credentials, experience, and chutzpah badassness, she tells the story through an adversarial lens. That is the partnership origin story of why we collaborate. Together we want to challenge the way the industry thinks about secure remote access, starting with VPNs - they are not effective and must be replaced." Tom Sego, CEO and founder, BlastWave As part of the collaboration, Knight Ink in partnership with its sister company M&A Knight Studios, will create written and visual experiences for BlastWave in the form of whitepapers, videos, and episodic short films to demonstrate the business imperative of organizations moving to zero-trust network access (ZTNA) powered by BlastWave's SDP solution. BlastShield integrates three innovative products into a single, patented SDP solution that combines infrastructure, cloaking and passwordless multi-factor authentication (MFA) for identity-based secure remote network access for organizations that have adopted a zero-trust security model. BlastShield enables organizations to hide on-premises and cloud workloads from outsider and insider threats, concealing an organization's infrastructure from cyberattacks through software-defined microsegmentation, without modifications to existing network fabric and hardware. BlastWave solves the problem that traditional VPNs and other complex end-point technologies have been unable to address by applying a zero-trust software-defined perimeter throughout the network architecture, not just at the endpoint, rendering the entire network invisible. About BlastWave Founded by former executives and technologists from Apple and Cisco, BlastWave is taking a fundamentally different approach to security aimed at protecting privacy and connected devices from cyberattacks. BlastWave's patented product, BlastShield™️, is an integrated, zero-trust stack that combines state-of-the-art passwordless multi-factor authentication with high-performance, resilient encrypted connectivity and built-in microsegmentation. BlastWave is backed by Rocket Strategies, Lucas Venture Group, and Millennium Investments. The company is headquartered in Palo Alto, California. About Knight Ink Knight Ink is a content strategy, content creation, and influencer marketing agency founded for category leaders and challenger brands in cybersecurity to fill current gaps in content marketing. We will help you create and distribute your stories to the market in the form of written and visual storytelling drawn from 20+ years of experience working with global brands in cybersecurity. We are trusted advisers to cybersecurity marketing leaders to help them find their blue ocean strategy; develop their content strategy; and create the content that tells their unique story through the lens of an adversary. The content we create for our clients tells that story of efficacy through the lens of the adversary that their product protects their customers against.

Read More

VPN

Edgecore Networks’ Pocket WFA Solution Delivers Incredible Agility with Infinite Possibilities

Edgecore Networks | February 15, 2022

Edgecore Networks, a leading provider of traditional and open network solutions for enterprises, data centers, and telecommunication service providers, announced the launch of the Pocket WFA (Work-from-Anywhere) solution that is composed of two phenomenal Edgecore products – the EWS5203 WLAN gateway-controller and the SP-W2M-AC1200-WFH wireless access point. The solution aims to provide a plug-and-play, secure, agile, reliable mechanism to support businesses through the pandemic crisis and beyond. In-Pocket Agility In a world full of uncertainty, everything is about efficiency and agility. The zero-touch configuration feature of the Pocket WFA solution reduces the deployment time from days to only minutes. Enterprises can swiftly roll out remote offices, minimizing business downtime at a friendly price. Plus, the SP-W2M-AC1200-WFH access point is just palm-size and weighs only 82g, so remote workers can easily carry it wherever they work to further ensure business productivity. On top of that, to deliver a seamless working environment, the solution allows remote workers to connect to the same SSID as they would in the office for automatic connection to the company VPN, extending enterprise services to anywhere. Taking security on board, the solution supports various user authentication methods that can be easily enforced across all deployment scenarios, such as 802.1X authentication, local authentication, and two-factor authentication, ensuring the proper identification of network users before granting access to the network. Out-of-Box Possibilities The Pocket WFA solution can be deployed in various scenarios in a number of ways, such as mobile taskforce teams, branch sites, remote classrooms, and so on. The agility and affordable price enable new services and new business models that are not bound by infrastructure limitations and can embrace limitless possibilities. Organizations globally are experiencing unprecedented workforce disruption. Virtually all companies are still determining how they will work in the short and long term. The Pocket WFA solution is rising to the challenge, helping enterprises and organizations navigate workforce shifts, such as the urgent need to shift to a remote workforce to protect and empower employees, serve customers, and establish business continuity.” Teng Tai Hsu, Vice President of Edgecore Networks The Pocket WFA solution not only assists businesses to emerge from the pandemic stronger, but also opens the door to innovative business and service opportunities in the post-pandemic era. About Edgecore Edgecore Networks Corporation is a wholly owned subsidiary of Accton Technology Corporation, the leading networking ODM. Edgecore Networks delivers wired and wireless networking products and solutions through channel partners and system integrators worldwide for data center, service provider, enterprise, and SMB customers. Edgecore Networks is the leader in open networking, providing a full line of open 1G-400G Ethernet OCP-Accepted switches, core routers, cell site gateways, virtual PON OLTs, optical packet transponders, and Wi-Fi access points that offer choice of commercial and open source NOS and SDN software.

Read More

Events