Virtual Desktop Strategies, Virtual Server Infrastructure

Zero Trust Maturity Model

June 13, 2023

zero-trust-maturity-model
The Cybersecurity and Infrastructure Security Agency (CISA) leads the nation’s effort to understand, manage, and reduce cybersecurity risk, including by supporting Federal Civilian Executive Branch agencies in evolving and operationalizing cybersecurity programs and capabilities. CISA’s Zero Trust Maturity Model (ZTMM) provides an approach to achieve continued modernization efforts related to zero trust within a rapidly evolving environment and technology landscape. This ZTMM is one of many paths that an organization can take in designing and implementing their transition plan to zero trust architectures in accordance with Executive Order (EO) 14028 “Improving the Nation’s Cybersecurity” § (3)(b)(ii),1 which requires that agencies develop a plan to implement a Zero Trust Architecture (ZTA). While the ZTMM is specifically tailored for federal agencies as required by EO 14028, all organizations should review and consider adoption of the approaches outlined in this document.

Spotlight

Kimbia

Our online fundraising and crowdfunding platform, plus digital services are built with one goal in mind: to help our customers grow their online revenue, faster. Technology should not hinder the donor or participant experience. It should speed and enhance it. Our better fundraising solutions help you quickly find, convert and retain more loyal supporters, those who share your mission across many channels and continents. With Kimbia, you can focus on what matters most—your mission, and the donors and supporters who make it possible. Based in Austin, Texas, Kimbia is proud to support more than 5,000 customers to date, including the American Heart Association, WGBH-Boston, The Heritage Foundation, Vietnam Veterans Memorial Fund and The Boston Foundation. For more information, visit http://www.kimbia.com.

OTHER WHITEPAPERS
news image

The Era of Multi-Cloud Services Has Arrived

whitePaper | May 18, 2022

Companies are choosing to deploy apps and consume services on the clouds that best suit their business objectives. This model, known as multi-cloud, uses two or more public clouds, two or more private clouds, or a combination of public, private and edge clouds to distribute applications and services. Multi-cloud strategies offer several advantages, from increased resiliency and agility to data sovereignty. A key benefit is that organizations can leverage a specific cloud provider’s bespoke capabilities and services to further transform their application stacks.

Read More
news image

vSRX Deployment Guide for Private and Public Cloud Platforms

whitePaper | August 8, 2022

Juniper Networks, the Juniper Networks logo, Juniper, and Junos are registered trademarks of Juniper Networks, Inc. in the United States and other countries. All other trademarks, service marks, registered marks, or registered service marks are the property.

Read More
news image

Compliance with Internal Revenue Service (IRS) Publication 1075

whitePaper | June 15, 2022

The United States Internal Revenue Service’s (IRS) goal is to promote taxpayer confidence in the integrity of the tax system by ensuring confidentiality of the tax information provided to the federal, state and local agencies. The IRS 1075 publication provides guidance to agencies, agents, contractors and subcontractors on implementing adequate policies, processes, controls and safeguards to protect Federal tax information (FTI).

Read More
news image

IPsec VPN User Guide

whitePaper | September 15, 2022

For each VPN tunnel, both AH and ESP tunnel sessions are installed on Services Processing Units (SPUs) and the control plane. Tunnel sessions are updated with the 7 protocol on is completed. For SRX5400, SRX5600, and SRX5800 devices, tunnel sessions on anchor SPUs are updated with the protocol while non-anchor SPUs retain ESP and AH tunnel sessions. ESP and AH tunnel sessions are displayed in the outputs.

Read More
news image

Network Functions Virtualisation – Introductory White Paper

whitePaper | December 2, 2019

The key objective for this white paper is to outline the benefits, enablers and challenges for Network Functions Virtualisation (as distinct from Cloud/SDN) and the rationale for encouraging an international collaboration to accelerate development and deployment of interoperable solutions based on high volume industry standard servers.

Read More
news image

Rubrik Security Cloud Architecture and Security Implementation

whitePaper | February 14, 2023

Rubrik is a cybersecurity company, and our mission is to secure the world’s data. We pioneered Zero Trust Data Security™ to help organizations achieve business resilience against cyberattacks, malicious insiders, and operational disruptions. Rubrik Security Cloud, powered by machine learning, delivers data protection and cyber resilience in a single platform across enterprise, cloud, and SaaS applications. It helps organizations uphold data integrity, deliver data availability that withstands adverse conditions, continuously monitor data risks and threats, and restore businesses with their data when infrastructure is attacked.

Read More

Spotlight

Kimbia

Our online fundraising and crowdfunding platform, plus digital services are built with one goal in mind: to help our customers grow their online revenue, faster. Technology should not hinder the donor or participant experience. It should speed and enhance it. Our better fundraising solutions help you quickly find, convert and retain more loyal supporters, those who share your mission across many channels and continents. With Kimbia, you can focus on what matters most—your mission, and the donors and supporters who make it possible. Based in Austin, Texas, Kimbia is proud to support more than 5,000 customers to date, including the American Heart Association, WGBH-Boston, The Heritage Foundation, Vietnam Veterans Memorial Fund and The Boston Foundation. For more information, visit http://www.kimbia.com.

Events