What role do SASE and SSE play in a Zero Trust concept?
Zero Trust differs from conventional security concepts in some respects. But when does that make sense and what role do SASE, ZTNA and SSE play?
IT security is a critical asset for companies and authorities in 2021 – after all securing data communication affects the most important business activities and services across an organization. With the demand for remote and mobile working at an all-time high, organizations need to act strategically on endpoint security and IT administration to protect their networks and sensitive data. Cybersecurity is the spearhead of any IT infrastructure and needs to be considered strategically from the outset – from cloud computing, data center operations and IIoT to regulated industries or health applications. Find out everything you need to know about the world of IT security.
What role do SASE and SSE play in a Zero Trust concept?
Zero Trust differs from conventional security concepts in some respects. But when does that make sense and what role do SASE, ZTNA and SSE play?
Why people are the biggest IT security threat – and what you can do about it!
Data theft in companies is often due to mistakes made by employees. However, most lapses in IT security can be easily avoided.
How SD-WAN enables secure site networking
An SD-WAN is a virtual wide area network that uses SDN and VPN technology to establish secure connections over the Internet throughout the company.
Modern VPN can secure any cloud infrastructure
VPN and cloud applications suit each other well. In an appropriate setting, a modern remote access solution perfectly complements current technology such as SD-WAN, Single Sign On, SASE or Zero Trust.
Why people remain a risk factor in data security
Not only are security vulnerabilities and malware a threat to data security in companies, external and internal attackers also pose a risk.
How IT security Made in Germany minimizes risks
Which IT security solutions can companies still trust? Read about how switching vendors minimizes the risks of backdoors and kill switches.
Blog archive
Missed out on our latest post or want to read more articles on IT security? We’ve got it covered in the NCP blog archive.