Search
Homepage Rankings and Research Companies Channelcast Marketing Matters CRNtv Events WOTC Avaya Newsroom Experiences That Matter Cisco Partner Summit Digital 2020 Cyber Resilience Zone HPE Zone The Business Continuity Center Enterprise Tech Provider Masergy Zenith Partner Program Newsroom HP Reinvent Digital Newsroom Hitachi Vantara Digital Newsroom IBM Newsroom Juniper Newsroom Intel Partner Connect 2021 NetApp Digital Newsroom The IoT Integrator Intel Tech Provider Zone NetApp Data Fabric WatchGuard Digital Newsroom

12 Lessons Learned From The SolarWinds Breach: RSA Conference

From scrutinizing technology suppliers and code used during the application development process to axing on-premise Active Directory, here are 12 key takeaways from the SolarWinds breach.

Back 1 ... 10   11   12   13  
photo

Ditch Firewalls And Traditional Security Appliances

A castle and moat approach to security is the wrong model for today’s threats since it allows anyone that breaches the perimeter broad access within the victim’s environment, according to Zscaler CEO Jay Chaudhry. Yet despite the glaring weaknesses of a firewall-based approach to security, Chaudhry said businesses are still investing more in firewalls than any other security technology.

Firewalls assume that anyone inside the corporate network is trusted without requiring further verification, and requires the buildout of separate branches onto a wide area network (WAN) to support satellite locations, Chaudhry said.

Instead of connecting users to the corporate network, Chaudhry said it’s more secure to connect users directly to the application they need to use. By having all users accessing applications through an exchange that verifies their identity, Chaudhry said organizations can eliminate the need for WANs, firewalls, and traditional security appliances.

 
 
Back 1 ... 10   11   12   13  

sponsored resources