Adaptive Micro-segmentation – Built-in Application Security from the Network to the Workload
A zero trust or least-privileged, security model has long been held as the best way to secure applications and data. At its core, a zero trust security model is based on having a whitelist of known good behaviors for an environment and enforcing this whitelist. This model is preferable to one that depends on identifying attacks in progress because attack methods are always changing, giving attackers the upper hand and leaving defenders a step behind.
The problem for IT and InfoSec teams has always been effectively operationalizing a zero trust model. As applications become increasingly distributed across hybrid environments and new application frameworks allow for constant change, a lack of comprehensive application visibility and consistent security control points is exacerbated for IT and InfoSec, making achieving a zero trust model even harder.
A modern application is not a piece of software running on a single machine — it’s a distributed system. Different pieces of software running on different workloads, networked together. And we have thousands of them, all commingled on a common infrastructure or, more lately, spanning multiple data centers and clouds. Our internal networks have evolved to be relatively flat — a decision designed to facilitate organic growth. But Continue reading

Just about every major US regulatory requirement says companies must use software that’s fully supported by the vendor that sells it. Simply put, if you’re using software that is beyond its end of life, you’re not only posing a security risk to your company – you’re also out of regulatory compliance.
The SevOne monitoring software previously only gave insights into Cisco’s SD-WAN service.
Borrowing from the astrological meaning, the Goldilocks Zone refers to the space where organizations have the right amount of resources and combination of components to support network life.
The company’s open source blockchain-based security platform is working with enterprises to secure their IoT data and devices.
These issues can delay deployments, result in inferior service quality, and make it difficult to reach return on investment goals, according to John Isch at Orange Business Services.
Red Hat unveils infrastructure migration for containers; AT&T completes its AlienVault acquisition; BT, TIP, and Facebook launch a startup competition.