CISA issued an alert on September 15, 2020 warning that an Iran-based threat actor is known to have penetrated a number of networks, and may be planning to deploy ransomware in addition to other malicious activity.
Implementing a Zero Trust network access solution that can limit the severity of an attack is an important first step.
Thus far, 2020 has been the year in which already-complicated things became true hornets’ nests
Ten years ago, on September 14, 2010, John Kindervag of Forrester Research published his seminal article on the Zero Trust data security concept.
Enterprises need to take a defense-in-depth approach to cybersecurity during these challenging times.
Why You Should Be, and What You Can Do About It
VPNs Are Today’s Answer For Remote Access. Ericom Application Isolator Adds Vital Protections Against Cyberattacks.
Note: Ericom Application Isolator is now available as ZTEdge Simplified Remote Application Isolation. Read more about it here. Faced with...
Forcepoint Integrates Ericom Shield™, Adding Remote Browser Isolation to Its Dynamic Edge Protection Cloud-Native SASE Solution
We are excited to partner with Forcepoint and their channel partners to deliver our award-winning RBI solution together with Forcepoint’s solutions.