Blog
Network Insight.

defined perimeter

Although organizations realize the need to upgrade their approach to user access control. The deployment of existing technologies is holding back the introduction of Software Defined Perimeter (SDP). A recent report carried out by the Cloud Security Alliance (CSA) on the “State of Software Defined Perimeter” states that the main …

Zero Trust Access

The foundations that support our systems are built with connectivity and not security as an essential feature. TCP connects before it authenticates. Security policy and user access based on IP lack context and allow architectures that exhibit overly permissive access. Most likely, this will result in a brittle security posture …

Our digital environment has been transformed significantly. Unlike earlier times, we now have a bunch of different devices, access methods, and types of users accessing applications from a variety of locations. This makes it more difficult to know which communications can be trusted. The perimeter-based approach to security can no …

Intent-based networking is not just hype. It is a necessary development and from a technology standpoint, it has now arrived. However, cultural acceptance will take a little longer.  Organizations are looking to modernise their business processes and their networks. Yet, the traditional vertically integrated monolithic networking solutions prohibit the network …

kubernetes security best practice

Kubernetes has quickly become the de facto orchestration tool for deploying Kubernetes microservices and containers to the cloud. It offers a way of running groups of resources as a cluster and provides a completely different abstraction level to single container deployments, allowing better management. From a developer’s perspective, it allows …

There has been tremendous growth in the adoption of the software-defined perimeter (SDP) and the zero trust security model over the last few years. This has resulted in SDP becoming a disruptive technology, especially when it comes to replacing, or working together with the existing virtual private network. Why? Because …

Not everything in Software-Defined Perimeter (SDP) is new: Single Packet Authorization. Even though we are looking at disruptive technology to replace the virtual private network and offer secure segmentation, one thing to keep in mind with zero trust and software-defined perimeter (SDP) is that it’s not based on entirely new protocols. So …

The zero trust framework for networking and security is here for a very good reason. There is a variety of bad actors: ranging from the opportunistic and targeted, to state-level and all are well prepared to find ways to penetrate a hybrid network. As a result, there is now a …

Today, organizations cannot know when and where the next attack is going to surface and how much damage it will cause. The risk is compounded by the fact that castle-and-moat security no longer exists. Network perimeters are fluid, with no clear demarcation points between “outside” and dangerous, and safely “inside.” …

We have seen a major evolution in technology where network functions can run in software on non-proprietary commodity hardware, be it a grey box or white box deployment model. Taking network functions from a physical appliance and putting them into a virtual appliance is only half the battle. The move …

Stateless Network Functions

There is a need for new technology and it’s time to break the tight state and processing. The involves the decoupling of the existing design of network functions into a stateless processing component ( stateless network functions) along with a data store layer. Doing this and breaking the tight coupling …

The majority of attacks originate externally. Why? Because we can’t control what we don’t know and the Internet can be a dirty place. The act of browsing the Internet and clicking on uniform resource identifier (URL) links opens the enterprise to significant risks of compromise. These concerns can be very …