Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Access Management

SSE: The MVP of The Cybersecurity Mesh Architecture

Overtime IT has adopted a number of siloed security services. These services work adjacent to one another, rather than WITH one another. As you would’ve guessed, this increases complexity and decreases efficiency. This is why we must do away with these types of models. The best security strategies focus on both people and technology. The modern era of work that we are all now experiencing has led to the need for IT security teams to get smarter with every single security incident that occurs.

Things to Ask Your SSE Vendor: Episode 6: Can your SSE simplify access into one UI, agent, & policy?

IT manages access policies across every business apps their users need - whether private, SaaS, or internet-based. To accomplish this simplicity is critical. By simplifying policies, and combining capabilities typically distributed across multiple point products, SSE platforms lead to better efficiency, less security gaps, and more optimization. But, at the end of the day users don’t care whether they are connecting through ZTNA, SWG or CASB, they just want to be able to do their jobs. The right SSE platform should deliver the fast, secure, connectivity that IT needs, with the seamless experience users expect. True harmony.

Privileged Access Management: Essential and Advanced Practices

Managing access rights of privileged users is one of the cornerstones of data security. That’s why the privileged access management (PAM) market is booming with tools and practices. But this variety of PAM options makes it challenging to figure out which practices and controls your organization can benefit from.

Stories from the SOC - Lateral movement using default accounts

The Windows ‘Administrator’ account is a highly privileged account that is created during a Windows installation by default. If this account is not properly secured, attackers may leverage it to conduct privilege escalation and lateral movement. When this account is used for administrative purposes, it can be difficult to distinguish between legitimate and malicious activity.

Amazon EC2 SSH Session Recording and Auditing with Teleport

This blog is Part IV in a series about identity-based access management of AWS resources. In Part I, we covered how to use OSS Teleport to access Amazon EC2 instances running in private subnets. Part II explained implementing identity-based access via SSO integration with Okta. Part III covered the steps to configure privilege escalation for just-in-time access requests. In Part IV, we will guide you through the steps to configure SSH session recording and auditing.

Atmos ZTNA | Product Demo

Short for “Atmosphere,” Atmos uses 350 edge locations to elegantly connect users, and servers, to the business resources needed for work. The platform artfully integrates Atmos ZTNA, Atmos web Gateway, Atmos CASB, Atmos Experience, and several other innovative Atmos capabilities, into one, cloud-native platform that feels weightless, and is controlled by a single pane of glass.

Atmos Web Gateway | Product Demo

Short for “Atmosphere,” Atmos uses 350 edge locations to elegantly connect users, and servers, to the business resources needed for work. The platform artfully integrates Atmos ZTNA, Atmos web Gateway, Atmos CASB, Atmos Experience, and several other innovative Atmos capabilities, into one, cloud-native platform that feels weightless, and is controlled by a single pane of glass.