Categories
-
Recent Posts
Category Archives: All
Zero Trust Is Incomplete Without Continuous Authorization
… and continuous authorization is only possible with real-time device trust and a means to instantly revoke access. Let’s face it, most professionals in enterprise security would agree that when it comes to secure remote access, Zero Trust is the … Continue reading
Posted in All
Leave a comment
The COVID-19 Quarantine Is Exposing The Challenges Of VPN-dependent Remote Access
User frustration and productivity loss should be a wake-up call as we accelerate the long-evolving trend toward the borderless enterprise. Is the current COVID-19 pandemic, and the resulting shelter-in-place response, really changing the way you think about securing your organization … Continue reading
Posted in All
Leave a comment
Tablets Will Cross the Tipping Point to become Serious Business Tools in 2014
Compared to PCs, tablets have faced severe limitations as a primary productivity tool for business. In fact, tablets have historically provided only a small fraction of the functionality businesses count on from desktop PCs and laptops. That will change in … Continue reading