A cybersecurity expert with over 20 years of experience in web technologies, architecture, infrastructure, networking and dev environments, Nick is responsible for solution management, technology strategy and technology partnerships. Nick was previously Symantec Group CTO for Global Service Providers, following his tenure as Director of the Chief Architect Team for Channel and Service Providers at Zscaler and an earlier position in the Symantec CTO organization. His certifications include CEH7, CCSK, BCCPP, Bluecoat Blue Knight, MCSE + Security, CCDP, CCNA, CCSA, VTP5 and VTSP5.
This is the fourth article in a mini-series on Identity and Access Management, IAM. In this fourth article in the series, we’ll look at best practices for enterprise-scale IAM.
This is the third installment of a multi-part series of articles on Identity Access Management (IAM). In this article, we discuss the basics of Access Management, the “AM” of IAM—specifically, managing network data access.
Authentication is the process of determining whether someone or something is, in fact, who or what it declares itself to be. Here are a few of the most common tools used to authenticate users within the framework of an IAM policy.
APTs are attacks where an unauthorized party infiltrates a network and remains undetected. Find out how to prevent them with zero trust strategy.Read more.
A history & overview of the field Gartner defines as 'enabling the right individuals to access the right resources at the right times for the right reasons'
A brief overview of the history of the zero trust model, how it came to be such a popular approach to mitigating cybersecurity threats and how you can get started implementing it in your organization
Implementing a zero trust network model protects your network & corporate resources from both external and internal threats. Here are the 5 steps you'll need to take.