Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

October 2022

Defending yourselves from cybersecurity ghosts, vampires, and zombies

It’s very likely that as a kid you would have dressed up as something scary for Halloween and walked around your neighborhood filling buckets with sweets. I couldn’t wait for Halloween. Even as I got older, I would look after my younger cousins (stealing some of their sweets in the process), or meet up with friends to watch scary movies, or attend fancy-dress parties! I bet most of you even do that today.

The Single Vendor SASE Unicorn Halloween Costume

If you are unfamiliar with single vendor SASE, here is what it is. Per Gartner, SASE is a converged network and security service which is delivered as a service. It “enables zero trust access based on the identity of the user, device or entity, combined with real-time context (such as device security posture) to enforce and govern security and compliance policies. Single-vendor SASE offerings should have a common management plane and data lake across all capabilities”. Whew. That is a lot.

Why Security Service Edge (SSE) Architecture Matters

The architecture of any security platform has a huge impact on its ability to protect your business. This still applies when evaluating a Security Service Edge (SSE) platform. Not all SSE platforms are made equal and the proof is in the way it was architected. Learn why architecture matters when selecting a SSE solution and different factors you should be aware of.

New risk findings will make you rethink VPN | VPN Risk Report 2022

The findings in Cybersecurity Insiders 2022 VPN Risk report really give you pause for consideration. Why settle for legacy VPN technology when you can adopt zero trust access with a Zero Trust Network Access (ZTNA) service. We’ll even help you get there! Let us buyback your VPN contract and you’ll get 6-months of free service with Axis’ Modern-Day ZTNA.

This new series is the first ever to teach IT architects how to adopt Zero Trust

I spent the first 25+ years of my career running global architecture teams for large multinational companies. I collaborated with and learned from my peers at some of the largest Fortune 2,000 companies in the world. We designed and implemented an architecture that enabled our businesses to transform. Security was but over the years it has become more critical as the infrastructure and data have evolved.

See what devices are compliant in seconds with Atmos

Whether your users have corporate-managed devices, BYOD, or a mixture of both, ensuring device compliance is challenging. Get visibility into ALL devices with Atmos. In seconds, see what devices have outdated OS's, which devices have Crowdstrike enabled, what devices have antivirus running, which devices are password protected and more.

Secure access to all apps powered by a single Atmos policy

Unlike other Security Service Edge (SSE) platforms, Atmos provides a single interface to manage All your policies, apps, devices, users, data, and more. Atmos logical policy creation helps IT admins define both broad and granular access permissions in minutes. The end result is easy policy creation and management without the headache or complexity.

Take M&A integration from months to minutes with Atmos Multi-IDP

Whether you’re helping onboard newly acquired users, or activating third-party contractors, its important for productivity that users are enabled with same day access to SaaS, Web, and private applications needed for work. With Atmos Multi-IDP support, Axis’ Security Service Edge (SSE) platform uses existing identity services paired with zero trust policies to automatically determine which users should get access to sensitive data while delivering a seamless experience.

Dirty appliances: The hidden environmental costs of VPN gateways

Another reason not to like your VPN. In networking we often discuss routing, packets, protocols and latency. It’s always been our lifeblood and our passion. Another area we are passionate about is hardware. A new router, firewall, switch or network appliance will elicit numerous debates and send us to a world of what if? What if I deployed this box to my network? How would it impact it? Would it make the network faster? Would it make my job easier?

CxOs: Here's how to budget for success during your Security Service Edge (SSE) project

Make budgeting easier when it’s time to modernize your access infrastructure. The air has a crispness to it, kids are back in school and the afternoon shadows are growing longer. For me, Fall has always been the season when the last revisions for projects and business as usual (BAU) budget requests were finalized. It was one of the last opportunities to dial in the plan of work for the upcoming year as well as align the projects with the critical financing which makes it all possible.