How to choose a Zero Trust architecture: SDP or Reverse-Proxy?

Zero Trust Network Access (ZTNA) is the next generation access solution that is set to be a key part of IT administrators toolkits, displacing longstanding Virtual Private…


Zero Trust Network Access: Granting access to unmanaged devices

This blog series explores the challenges of enabling unmanaged devices without putting enterprise data at risk. Read part 1 to learn how to enable endpoints that are not on the…


What is device risk posture and why does it matter?

Many businesses use credentials and some form of MFA to authenticate the user’s identity. Identity alone is not enough to safely grant access, device risk posture also needs to be…


What is the best user authentication?

Giving users access to the tools they need is key to digital transformation. With traditional technologies such as VPN and token-based MFA, IT and security managers have often…