What is zero trust architecture?

With the growing sophistication of hackers and malware, as well as a new era of connected mobile users, billions of IoT devices and public cloud applications being used everywhere, the Zero Trust Architecture is a new reality for many organizations. Zero Trust means no trusted perimeter. Everything is primarily untrusted and a device or user only receives the least privileged access. Even after authentication or authorization in some cases. A Zero Trust Architecture is used to stop potential security breaches.

What is zero trust architecture?

In many ways, a zero trust architecture is exactly that - an architecture based on the principle that nothing can be trusted. Under this philosophy, no device, user or application attempting to interact with your architecture can be considered to be secure. Quite the opposite in fact, as your starting position is to see everything as a potential threat requiring verification.

‘Zero trust’ as a concept was first introduced by Forrester Research and is generally considered by organisations who want a high level of assurance when protecting sensitive data and responding to modern cyber threats.

The “never trust, always verify” principle

Security models conventionally operate on the assumption that all internal network activities can be trusted. However, traditional methods have done little to stem the flow of cyber attacks and insider threats, which means that a fresh approach is required. One such measure is to increase visibility into internal traffic and apply user context.

This can be achieved by using a next-generation firewall with decryption capabilities.

Security models are traditionally designed to protect the perimeter, leaving threats that enter the network uninspected, invisible and free to morph and move wherever they choose, often extracting valuable and sensitive business data.

Lateral movement security

The purpose of a zero trust architecture is to address lateral threat movement within a network by leveraging micro-segmentation and granular perimeters enforcement, based on data, user and location. This is also known as the “never trust, always verify” principle, determining zero trust.

The lateral movement represents the different techniques that attackers use to navigate through a network when searching for valuable assets and data. With traditional perimeter-based security, sub-perimeters are defined within networks by using a specific combination of rules. As an example, these rules may use the application traffic direction and context around a user to identify anomalies. When an anomaly occurs, the movement of a user or traffic direction is blocked. The spread of an attack within an organization is identified by the sub-perimeters.

The point of infiltration is most often not the target location of an attacker. This is why stopping lateral movement is a priority. Attackers that infiltrate an endpoint for example, often need to move laterally throughout the networking environment, in search of the data centre housing the targeted content.

How you define movement or access depends on the user and its defined appropriate or logical interactions and behaviour. Users from the marketing department for example, often have no access to sensitive financial files about the organisation, but would have access to CRM systems, marketing assets and content. Users from finance do have access to finance-related data sources, but not necessarily information from the human resources department or marketing department. This is why identifying who users are and whether their actions during a session are considered appropriate is so important, Which applications do they use or try to access? Are these sensible actions that fit with the user’s role and capabilities?

When these inspection points or junctions are not in place, it is close to impossible to identify and prevent unsanctioned access.

Developing a Zero Trust Architecture

  • Gain visibility and context for all traffic – across user, device, location and application – by using zero trust in conjunction with zoning capabilities for visibility into internal traffic.
  • Gain traffic visibility and context. Traffic needs to run through a next-generation firewall that has decryption capabilities. Next-Generation firewall protection acts as the ‘border control’ within your organisation and enables micro-segmentation of perimeters.
  • Have the ability to monitor and verify traffic as it crosses between the different functions inside the network.
  • Add Two Factor Authentication (2FA) or other verification methods such as biometric verification, that increase the ability to verify users.
  • Implement a zero trust approach. This helps to identify business processes, data flows, users, data, and associated risks. It also helps to set policy rules which can be automatically updated based on associated risks, during every iteration.

Related solutions

Get in touch with our expertsOur team is ready for you

Do you want to know more about this topic? Leave a message or your number and we'll call you back. We are looking forward to helping you further.

Send a message

Latest updates

Placeholder for Engineers manufacturingEngineers manufacturing

OT security

Top five OT security threats

These OT Security threats provides an overview of critical and most common cyber threats to Operational Technology.

1 min. read
Placeholder for Office facade cloud reflectionOffice facade cloud reflection

Multicloud Cloud security

How to protect your multicloud?

Protect your data across the multicloud and drive increased innovation and agility.

4 min. read
Placeholder for Woman working in datacenterWoman working in datacenter

Network security

The 2 biggest network security threats this year

We dive deeper into what we believe are two of the most significant network security threats in 2021: DDoS and ransomware attacks.

Remco Hobo
Placeholder for Remco hoboRemco hobo

Remco Hobo

5 min. read
Placeholder for Retail shopper bags smartphoneRetail shopper bags smartphone

Zero-Trust

The password problem

What do these numbers and letters have in common? 123456, 123456789, picture1, password, 12345678, 111111.

Rachid Groeneveld
Placeholder for Rachid GroeneveldRachid Groeneveld

Rachid Groeneveld

8 min. read
Placeholder for Engineer laughing behind deskEngineer laughing behind desk

NGFW Palo Alto Networks

5 things you need to know about Palo Alto's PA-400 Series

The new PA-400 Series (NGFWs) are ideal for organisations in search of the lowest total cost of ownership (TCO), but wanting the best cybersecurity possible.

Anand Oswald
Placeholder for Male6Male6

Anand Oswald

3 min. read
Placeholder for Edr ndr mdr xdrEdr ndr mdr xdr

EDR NDR XDR MDR

EDR, NDR, XDR, MDR - Different concepts of Detection & Response

"Threat Detection & Response" is nowadays considered an indispensable means of securing corporate networks. We explain the difference between EDR, NDR, XDR and MDR.

1 min. read
Placeholder for Windmills cityWindmills city

Anti-DDoS

Top 6 DDoS protection solutions that should be on your radar in 2021

Overview of DDoS protection solutions to protect enterprises against these bigger, smarter and more diverse DDoS-attacks. These 6 should be on your radar in 2021! Find out more.

9 min. read
Placeholder for Shark threatShark threat

Cyber attacks Cloud security

Top cybersecurity threats to be aware of in 2021

Remote working, which is still the standard in 2021, brings new cybersecurity threats. These are the top threats of 2021.

1 min. read
Placeholder for Aerial view high riseAerial view high rise

Cyber attacks Security

Top cybersecurity companies to watch in 2021

We selected 6 top cybersecurity companies to watch in 2021, who have successfully differentiated themselves from other players in the market.

11 min. read
Placeholder for Ransomware aanval socRansomware aanval soc

Ransomware

Double Trouble: Ransomware with Data Leak Extortion, Part 2

As data leak extortion swiftly became the new norm for big game hunting (BGH) ransomware operators since late 2019, various criminal adversaries began innovating in this area. This includes collaboration between ransomware groups, auctioning leaked data and demanding not just one ransom for the ransomware decryptor but also a second ransom to ensure stolen data is deleted.

1 min. read
Placeholder for Facade modern buildingFacade modern building

NGFW Firewall

Top 5 best NGFW vendors of 2021

Next-Generation Firewalls (NGFW) can swiftly detect and combat attacks across the entire network. As cyber-attacks continue to become more sophisticated, NGFWs will continue to be essential components of any organisation’s security solution, whether you’re in a data centre, network, or cloud.

9 min. read
Placeholder for Figure1 medusalocker paymentportalFigure1 medusalocker paymentportal

Ransomware

What to do against a ransomware attack?

As a company, you can already do a lot to counter ransomware attacks. One of the measures is the deployment of a Security Operations Center (SOC). Find out why and how!

1 min. read
Placeholder for Close up laptopClose up laptop

Ransomware

Double Trouble: Ransomware with Data Leak Extortion, Part 1

As organizations improve their capabilities to rebound from ransomware attacks and security researchers continue to create decryptors for ransomware, there is less incentive for victims to pay the ransom in order to reclaim files. However, criminal actors have found a way to thwart these defensive measures.

1 min. read
Placeholder for ConstructionConstruction

Security

Security survey says: Don’t wait until it’s broken to fix it

In the report, “Network security in the spotlight: Understanding why it can go wrong is key to making the right investment decisions”. The Register conducted a survey of network and security professionals examining what drives organizations to excel in the delivery of information security.

1 min. read
Placeholder for Network security engineers meetingNetwork security engineers meeting

Security MFA

The importance of multi-factor authentication

Ethical hacker Victor Gevers reached news headlines this week as he managed to access president Donald Trump’s Twitter account for the second time.

1 min. read

Webinar: How CASB can protect your sensitive data

This is the last webinar in a serie of three cybertalk sessions. In this webinar Remco Hobo, Head of Cyber Security, explains how Cloud Access Security Broker (CASB) protects your sensitive data.

1 min. read
Placeholder for Webinar with womanWebinar with woman

Webinar: Why DLP matters to your security strategy

This is the second webinar in a serie of three cybertalk sessions. In this webinar Sr. Solution Architect Cyber Security Kunal Biswas will simplify Data Loss Prevention (DLP).

1 min. read
Placeholder for Gettyimages 1165939142Gettyimages 1165939142

SASE Juniper Networks

Implementing a SASE solution: it takes more than marketing

When implementing a SASE solution, there are important aspects to keep in mind according to Juniper. Having a cloud first mentality and a unique focus on user experience are key.

1 min. read
Placeholder for WebinarWebinar

Webinar: Demystifying SASE

This is the first webinar in a serie of 3 cybertalk sessions. In this first webinar our Sr. Solution Architect Cyber Security will demystify SASE (Secure Access Service Edge).

1 min. read
Placeholder for Windmills cityWindmills city

Fortinet Recognized as a 2020 Gartner Peer Insights Customers’ Choice for WAN Edge Infrastructure

Fortinet is named a 2020 Gartner Peer Insights Customers’ Choice for WAN Edge Infrastructure for its best Secure SD-WAN solutions.

1 min. read
Placeholder for Mcafee partner reseller priceMcafee partner reseller price

McAfee Named a 2020 Gartner Peer Insights Customers’ Choice for CASB

For the third year in a row, McAfee was named a 2020 Gartner Peer Insights Customers’ Choice for CASB with its MVISION Cloud solution.

1 min. read
Placeholder for Multicloud skyMulticloud sky

The Industry’s Most Comprehensive SASE Just Got Better with CloudGenix

Palo Alto Networks bring Prisma Access and CloudGenix together, delivering one of the best SASE solutions

1 min. read
Placeholder for Skyline reflectionSkyline reflection

Top 5 Next-Generation NGFW Firewall Vendors 2020

Firewall technology has evolved significantly over the past decade. We review 5 of the best NGFW vendors for 2020, including advanced Next-Generation Firewall features to look for.

1 min. read
Placeholder for Green snakeGreen snake

Building an Enterprise Grade SD-WAN

The next step in the evolution of connectivity services is having the best SD-WAN solution, where the underlying technology is not new, but rather the way in which it is managed is new.

1 min. read
Placeholder for Night city streetNight city street

5 reasons to consider a managed SOC service provider

When dealing with security threats, organisations could opt for a managed SOC (Security Operations Center). We provide five managed SOC service provider benefits.

8 min. read
Placeholder for Falcon x banner bgFalcon x banner bg

Cybersecurity in the Time of COVID-19: Keys to Embracing (and Securing) a Remote Workforce

Learn what six key factors can help ensure remote worker cybersecurity and how to adopt a remote workforce quickly.

1 min. read
Placeholder for Facade modern buildingFacade modern building

Firewall

How to manage your firewall operations

Enhance security, reduce service interruptions and automate day-to-day tasks through powerful firewall operations management capabilities and reporting.

Remco Hobo
Placeholder for Remco hoboRemco hobo

Remco Hobo

1 min. read
Placeholder for FlyoverFlyover

Juniper Networks Network automation

Juniper Networks’ 2019 State of Network Automation Report

Discover the impact of network automation. This report reveals how today’s use of automation affects engineers, NetOps teams, and business.

1 min. read
Placeholder for Futuristic bridge at nightFuturistic bridge at night

5 ways to boost your cyber security in 2020

Finding the best cyber security solutions in 2020 starts by improving policies and strengthening existing security tools in use.

1 min. read
Placeholder for Milkyway lakesMilkyway lakes

Security Managed services

Eight major benefits of having a Managed Security Services Provider (MSSP)

Managed Security Services Providers (MSSPs) provide structural security solutions against cyberattacks, including always up-to-date expertise in the latest cyber threats and appropriate solutions. Here's 8 benefits of the best MSSP to prevent cyberattacks and save costs.

9 min. read
Placeholder for Juniper networks routingJuniper networks routing

Juniper Networks

Juniper Universal Services Framework for Security = Operational Consistency

Juniper announces the SPC3 security services card for MX240, MX480 and MX960 routers and Universal Services Framework.

1 min. read
Placeholder for Leave green macroLeave green macro

Prevent lateral compromise with microsegmentation

Why network microsegmentation matters for network security and how it helps mitigate the spread of lateral compromise.

1 min. read

Why 5G Security and Interoperability must not be optional extras

Mobile Solutions Architect Ditri Trio elaborates on 5G Security and Interoperability challenges with existing 3G and 4G networks.

1 min. read
Placeholder for Glass architectureGlass architecture

19 Cloud Security Best Practices for 2019

Mitigate risks to using any cloud service with these Cloud Security Best Practices. Cloud computing has become near-ubiquitous, with roughly 95 percent of businesses reporting that they have a cloud strategy.

1 min. read
Placeholder for Tunnel traffic nightTunnel traffic night

Rapid international expansion thanks to specialisation

Interview with Infradata Group CEO Nino Tomovski. About the international growth of Infradata Group, Cyber ​​Security solutions and the importance of local expertise.

1 min. read
Placeholder for Close up tabletClose up tablet

CrowdStrike Firewall

CrowdStrike Introduces Falcon Firewall Management for Cloud-Native Platform

Cloud-Native Falcon Firewall Management offers simple, cross-platform management of host/OS firewalls from the Falcon console, providing customers with enhanced protection from network threats.

1 min. read
Placeholder for Shark fish schoolShark fish school

The Dark Side of Governments: A Growing Threat of APT Groups

For most nation states, covert advanced persistent threat (APT) groups are an equally valuable tool that operate in the shadows, stealing data, disrupting operations, or destroying the infrastructure of targeted enemies.

1 min. read
Placeholder for Milkyway lakesMilkyway lakes

Network security

Top 5 Network Security Solutions and Technologies

The 5 best Network security solutions and technologies that help define and guarantee business success. Unfortunately many enterprises do not know what network security solutions are essential to securing their network and data.

1 min. read
Placeholder for Partial view of woman using laptopPartial view of woman using laptop

Endpoint security EDR

5 Endpoint Security Best Practices

Your Cyber Security strategy should include Endpoint Security, as it is one of the most critical components for network security. In this article, our experts sum up Endpoint Security best practices for the Enteprise.

1 min. read
Placeholder for Fortinet firewallFortinet firewall

Fortinet Wins SE Labs Best Network Security Appliance Award

Fortinet has been awarded the Best Network Security Appliance award from SE Labs – one of the most respected labs in the testing community. SE Labs has been testing FortiGate products for the past three years, and in addition to this accolade, have awarded a AAA rating to the FortiGate solution for the third year in a row.

1 min. read
Placeholder for Shark fish schoolShark fish school

Network security Enterprise networking

Top 5 Key Challenges for Network Security

We have compiled a list of key challenges regarding network security and cyberthreats, as numerous companies and governments are taking measures to ensure privacy and maintain security by preventing cyberattacks. Nevertheless, cybersecurity remains a constant and ongoing issue of considerable concern.

1 min. read
Placeholder for FlyoverFlyover

DDoS Attacks Growing Ever-More Sophisticated and Efficient

DDoS attacks in 2019 remain some of the most prevalent. Research of Forbes reports that there were 2,216 data breaches and more than 53,000 cyber security incidents in March 2018.

1 min. read
Placeholder for Round facade officeRound facade office

Mist Will Join Juniper Networks to Accelerate AI for IT Adoption

Five years ago, I had the good fortune of launching a new company with two luminaries in the networking space – Bob Friday and Brett Galloway. Together, we recognized that the world of IT was at an inflection point whereby the old, reactive way of delivering services needed to be replaced by a new model built on AI-driven automation and user insight.

1 min. read
Placeholder for Digital identityDigital identity

Endpoint security

Top 5 Endpoint Security Solutions of 2019

Here's the 5 best endpoint security solutions. Recent studies show that 30 percent of known breaches involved malware being installed on endpoints. Select an Endpoint Protection Selecting that fits your needs considering these vendors

7 min. read
Placeholder for Wide angle sky line blueWide angle sky line blue

Juniper Networks Acquires Mist Systems to Bring AI to IT

. With a shift from mere service management (ITSM) to strategic enabler, the very purpose of IT has changed. Where the past was about uptime in a largely static environment, the present is about user experience

1 min. read
Placeholder for Education classEducation class

Infradata delivers National Education Network security system to Poland

Infradata Polska will launch the NASK National Research Institute project for the delivery of the National Education Network (Ogólnopolska Sieć Edukacyjna, OSE) security infrastructure system. Infradata’s offer was selected in a tender. The project will ultimately cover 25.000 schools.

1 min. read
Placeholder for Milkyway roadMilkyway road

Security

The 5 key IT security assessment types

Different IT Security Assessment types explained. Every day, digital attacks threaten the continuity of your business. Cybersecurity assessments accurately map out the threat.

4 min. read
Placeholder for FlyoverFlyover

Does size Matter? Capacity considerations when selecting a DDoS mitigation service

Internet pipes have gotten fatter in the last decade. We have gone from expensive 1 Mbps links to 1 Gbps links, which are available at a relatively low cost.

1 min. read
Placeholder for Drops on green leaveDrops on green leave

Cisco announces Wi-Fi 6 product portfolio

Cisco announced Wi-Fi 6 solutions and products for improved wireless connectivity this week. Besides the Wi-Fi 6 Access Points, Cisco also announced the Catalyst 9600 campus Core Switch purpose-built for cloud-scale networking.

1 min. read
Placeholder for Juniper networks nxtJuniper networks nxt

Juniper Networks introduces SD-WAN as a Service solution

Juniper’s Contrail Service Orchestration now manages the full enterprise branch, campus and cloud SD-WAN, now adding branch security, LAN and Mist Learning WLAN

1 min. read
Placeholder for Northern lightNorthern light

Establishing the Zero-Trust Cybersecurity Framework

The principle 'Zero-Trust' is one of the most integral security frameworks in recent times. Its crux lies in simplicity - a default deny for all flows and concept of minimal access. To effectively realize 'Zero Digital Trust' in your ecosystem here's what it entails.

1 min. read
Placeholder for Power plantPower plant

Ransomware 'LockerGoga' wreaks havoc on Norway's Norsk Hydro

What is 'LockerGoga' ransomware and how did it infect Norway's Norsk Hydro? Read all about it in this blog.

1 min. read
Placeholder for Power plantPower plant

Half of Top 12 Global Exploits Targeted IoT Devices

Fortinet announced the findings of its latest quarterly Global Threat Landscape Report. The research reveals that half of the top 12 global exploits targeted IoT devices, and four of the top 12 were related to IP-enabled cameras.

1 min. read
Placeholder for Lily flower macroLily flower macro

5G security: Challenges to overcome enabling new business models

As the world is about to start rolling out 5G networks, the question arises what the challenges will be to address 5G security and privacy concerns. In this blog René shares his thought on 5G security challenges and potential business benefits.

1 min. read
Placeholder for Milkyway roadMilkyway road

Juniper Networks expedites 5G Transformation for Service Providers

Juniper Networks continues to expand to address use cases across access, pre-aggregation and aggregation to assist in the transitions from 4G LTE to 5G. Includes ACX700 Universal Metro Routers, industry-first 400GbE native MACsec support and Triton Silicon-powered 14.4Tb line cards for the PTX10008

1 min. read
Placeholder for Feather macroFeather macro

Palo Alto Networks

Palo Alto introduces 'fastest Next-Gen Firewall' with PA-7000 series

The Next Generation Firewall PA-7000 Series, enhanced with new network processing cards, offers threat prevention at speeds twice as fast as the nearest competitor,

1 min. read
Placeholder for Laptop dev codeLaptop dev code

Another coding example that turned into a malicious threat

Two days ago an example of bad code popped up in the security community when a programmer was reviewing 7Zip's code to see if it would suit his needs. 7Zip is a free open source software for compression and packing/unpacking of ZIP and GZIP formats.

1 min. read
Placeholder for Windmills cityWindmills city

SD-WAN

What is zero touch provisioning and is it useful for me?

Zero Touch Provisioning or ZTP is a term that appears increasingly on the feature list of networking products. ZTP can be found in switches, wireless access points, (SD-WAN) routers, NFV-platforms and firewalls.

Jan-Willem Keinke
Placeholder for Jan Willem KeinkeJan Willem Keinke

Jan-Willem Keinke

6 min. read
Placeholder for Media broadcastingMedia broadcasting

Global media company transforms network security with visibility and Network Access Control (NAC)

Infradata supports a leading media company to strengthen the security of the network through Network Access Control (NAC). With this security solution, the security policy for access to the entire network as well as endpoint security is greatly improved.

1 min. read
Placeholder for Street by night5Street by night5

6 cybersecurity trends you need to know for 2019

With the continuous growth of new emerging technologies and innovative Cyber Security solutions being developed, we asked our Cyber Security experts: What are the 6 cyber security trends for 2019 to watch?

1 min. read
Placeholder for Arista networks background2Arista networks background2

Arista to Demonstrate Any Cloud Networking for Kubernetes at KubeCon NA 2018

New solution uses Arista virtual and cEOS software instances to provide a uniform enterprise-class/cloud-grade routing platform with enhanced visibility and security features tied into OpenShift and Calico commercial enterprise platforms from Red Hat and Tigera.

1 min. read
Placeholder for ForcepointForcepoint

Forcepoint Reveals Cyber Security Predictions for 2019

Forcepoint launched its Forcepoint Cyber Security Predictions 2019 Report . The report provides guidance on the sophisticated threats facing organizations in the months to come.

1 min. read
Placeholder for Junos 10 tipsJunos 10 tips

Symantec and Fortinet Partner to Deliver Cloud Security Service

Symantec and Fortinet announced an expansive partnership agreement today to provide customers with comprehensive and robust security solutions.

1 min. read
Placeholder for Engineers manufacturingEngineers manufacturing

Pulse Secure expands Firewall Auto-provisioning and Behavioral Analytics for IIoT Security

Pulse Secure, the provider of Secure Access solutions to both enterprises and service providers, announced the release of Pulse Policy Secure (PPS) 9.0R3 to extend its Zero Trust Security model to IIoT devices and smart factories.

1 min. read
Placeholder for Fortinet firewallFortinet firewall

Fortinet Introduces New Security Automation Capabilities on Amazon Web Services

Fortinet announced the expansion of its Fortinet Security Fabric offerings and new automation capabilities for AWS to provide streamlined and consistent security management for hybrid infrastructures.

1 min. read
Placeholder for Street by nightStreet by night

Mirai: Not Just For IoT Anymore

Botmasters have taken the lessons from developing Internet of Things (IoT) malware and shifted their focus to targeting commodity Linux servers. Like many IoT devices, unpatched Linux servers linger on the network, and are being abused at scale by attackers sending exploits to every vulnerable server they can find.

1 min. read
Placeholder for Night city streetNight city street

2018 Holiday Season Mobile Malware Attacks Are Prevalent

Fortinet Threat Report Reveals Over One-quarter of Organizations Experienced a Mobile Malware Attack. Read more about the 2018 Cyber Security report by Fortinet here.

1 min. read
Placeholder for Honey jar blogHoney jar blog

Dipping into the honeypot

Brute-forcing factory default usernames and passwords is a winning strategy for Internet of Things (IoT) botnet propagation. Research Analyst Matthew Bing dives into the details of IoT botnets.

1 min. read
Placeholder for DatacenterDatacenter

The road to next level Data Loss Prevention

Data leaks happen constantly to many different organizations. We have examples of cases in which credit card data of hundreds of thousands of users was leaked, or disgruntled workers that copy sensitive data of the organization they want to leave, to later publish or sell that information in the external world, damaging users and businesses. There is no limit to the amount of data that can be leaked, nor to the amount of damage that can be done.

1 min. read
Placeholder for LondonLondon

UK Government launches Code of Practice for IoT Security

The UK department for Digital, Culture, Media and Sport has launched a Code of Practice for consumer IoT security. The aim of the Code of Practice is to "support all parties involved in the development, manufacturing and retail of consumer IoT", as stated on the UK.gov website.

1 min. read
Placeholder for Smartphone closeupSmartphone closeup

Why Mozilla Firefox's upcoming DoH update might be a mistake

"DoH does not solve a real problem. Contrary, it creates a problem." In his blog solution architect Hilmar Burghraaff dives into the potential risks of Mozilla moving DNS to HTTP over DNS.

1 min. read
Placeholder for Falcon x banner bgFalcon x banner bg

Gartner and Forrester position Crowdstrike leader in endpoint security

Crowdstrike's cloud-delivered Endpoint protection solutions have been named a leader by Forrester and leads the visionary quadrant in the 2018 Gartner Magic Quadrant for Endpoint Protection Platforms.

1 min. read
Placeholder for Architectural stairs glass roofArchitectural stairs glass roof

Cloud networking

Keep your network services up to date

DNS and IPAM are among the most fundamental pillars of network services. Networks are rapidly evolving, following trends in virtualisation, security, cloud, SDN, IPv6, and IoT.

4 min. read