Category Archives: All

Zero Trust Is Incomplete Without Continuous Authorization

… and continuous authorization is only possible with real-time device trust and a means to instantly revoke access. Let’s face it, most professionals in enterprise security would agree that when it comes to secure remote access, Zero Trust is the … Continue reading

Posted in All | Leave a comment

The COVID-19 Quarantine Is Exposing The Challenges Of VPN-dependent Remote Access

User frustration and productivity loss should be a wake-up call as we accelerate the long-evolving trend toward the borderless enterprise. Is the current COVID-19 pandemic, and the resulting shelter-in-place response, really changing the way you think about securing your organization … Continue reading

Posted in All | Leave a comment

Tablets Will Cross the Tipping Point to become Serious Business Tools in 2014

Compared to PCs, tablets have faced severe limitations as a primary productivity tool for business. In fact, tablets have historically provided only a small fraction of the functionality businesses count on from desktop PCs and laptops. That will change in … Continue reading

Posted in All, Mobility, Technology | Tagged , , | Leave a comment