According to a new press release, “With millions working from home during the COVID-19 pandemic, organizations have uncovered an expected problem: many of their employees don’t have access to critical files stored in on-premises servers and storage applications. The virtual private networks (VPNs) that organizations often rely on to manage access to critical files are […]
DH2i Launches DxOdyssey Work From Home Software – Completely Free of Charge
According to a new press release, “DH2i®, a leading provider of multi-platform Software Defined Perimeter (SDP) and Smart Availability™ software, today announced that in response to the COVID-19 world health crisis and the resulting need to reinvent how we work, DH2i will be offering its DxOdyssey networking software, completely free-of-charge, to anyone seeking to access […]
Four Reasons Why SDP is the Best Way to Secure Remote Access
Click to learn more about author Gerry Grealish. Software-defined perimeters are designed with flexibility, scalability, and security in mind. They offer many advantages over access-enablement technologies such as virtual private networks (VPNs) and Network Access Control (NAC) and are also foundational technologies for zero-trust security. Let’s learn what makes SDP so powerful and so secure. […]
Two Data Security Predictions for 2020
Click to learn more about author Don Boxley. As we enter another new year and kick off a fresh decade, it’s a great time to call out some technology predictions for 2020 and beyond. Topping my list are data security and disaster recovery (DR). When it comes to these two critical technology areas, my predictions […]
SD-WAN: Light at the End of the IoT Security Tunnel
Click to learn more about author Michelle Arney. The world is getting smaller every day and becoming more and more connected, thanks in large part to technology. Certainly, the Internet of Things (IoT) has played a major role in this transformation, and will continue to do so. Gartner predicts that next year the world will […]
Protecting Data Privacy in the Era of Digital Trading
Click to learn more about author Samuel Bocetta. The finance sector has been in the news a lot lately, but not because of the economy or the state of the stock market. Over the past few years, banking and credit providers have taken the spotlight due to record-setting breaches that put consumer information at risk. […]
How to Overcome Today’s Distributed Enterprise’s Top Four Connectivity Issues
Click to learn more about author Michelle Arney. Enterprise organizations around the world have traditionally leveraged virtual private networks (VPNs) to connect remote locations and/or to deploy new apps. Until rather recently, VPNs were the ideal solution to assist in controlling costs, while also providing a level of security. However, as the data landscape has […]
Eliminating Cloud Data Management and IT Operations Security Woes
Click to learn more about author Don Boxley. Key elements of Data Management and IT operations continue to move to the cloud due to its numerous benefits, such as cheap storage, pay-per-use pricing, disaster recovery (DR), and on-demand resources. This trend shows no signs of slowing, and will undoubtedly continue for some time. Unfortunately, while […]
Evolving Cloud Networks and How to Keep Them Secure
Click to learn more about author Pete Johnson. The triumvirate of the Data Center world has traditionally consisted of compute, storage and networking, so naturally Cloud Computing has been based on the same. Just as we saw in the private Data Center world, networking tends to lag the other two in terms of evolution, and […]
The Care and Feeding Of Your Virtual Private Networks
Click to learn more about author David Schlesinger. The Internet is a marvelous system of connected systems. It is a global phenomenon that we are still learning how to use. Telephone networks could be said to be an ancestor of the Internet, as could the earlier telegraph systems. One factor common to all these electronic communication […]