Virtual Private Networks (VPNs) came about in 1996 when Microsoft released the point-to-point tunneling protocol (PPTP) to secure connections between the user device and the internet resource(s) the user was connecting to. As the use of the internet grew, businesses began using VPNs to securely transmit data between sites. Eventually, the use of VPNs became ubiquitous, and are commonplace across businesses and homes today. Private VPN companies are thriving as… Read More
Microsegmentation: Defense against unseen mines in your network
I proudly served in the US Navy for the better part of 14 years. The first ship I served on was the USS Missouri (BB-63) as a Hospital Corpsman. During my time aboard, we deployed to the Persian Gulf as part of the battle contingent for Operation Desert Storm. Whenever a ship enters a potentially dangerous situation, the Captain orders, “General Quarters, set condition Zebra.” Condition Zebra means that every doorway on… Read More
Network Resiliency vs. Network Security – What’s the Big Deal?
There is a risk of becoming so focused on security controls and tools, businesses can neglect a key area of vulnerability and risk – the network. Conventional enterprise network architectures have not been designed and built for the dynamic and diverse deployment scenarios we face today. While network resilience has been the focus for most tech leaders; the distributed nature of our workforce makes “edgeless” networks an attractive and lucrative… Read More
Considerations of the Modern Network
The past two years have seen radical changes in the way we use the network. Seemingly, in the blink of an eye, we have gone from an in-office, centralized and controlled network to a fully or near-fully distributed model. The pandemic revealed the practicality, problems, and needs of a remote workforce. We also learned that the workforce largely prefers the remote model over the in-office models of the past. As… Read More
Don’t Be the Next Victim: 3 Critical Layers for Protecting Against Polymorphic Malware
As if cyber-defense wasn’t difficult enough – try battling malware that constantly changes its identifiable features in order to evade detection. Polymorphic malware isn’t new; the first polymorphic virus dates back to 1989. But fast-changing polymorphic malware now makes up 97% of the malware organizations face – updating itself with new definitions every few days, mutating faster than traditional security systems can keep up and making previous detection signatures obsolete. There are… Read More
Cyber Resilience Isn’t Enough: The Three Layers of Infrastructure Resilience
Resilience is a hot topic these days, and for good reason. With our hyper-dependency on data and access, there is a very low tolerance for error or disruption, and the distributed nature of our workforce makes “edgeless” networks an attractive and lucrative target for adversaries. Cyber Resilience includes elements like endpoint protection, firewalling, advanced phishing, email protection and DNS defense – all working together to ensure a fortified security posture. Yet… Read More
DataEndure’s New White Paper Takes a Closer Look at Zero Trust
Ponemon’s Cost of a Data Breach Report was recently updated for 2021, and notably, 65% of organizations said they do not have Zero Trust implemented. And of those, 43% have no plans to deploy it. Given how convoluted the topic of Zero Trust can be those statistics aren’t particularly surprising. Yet given the security threats we face today and the changing nature of the enterprise, Zero Trust is a critical… Read More
A Tale of 2 Micros: Microbrew and Microsegmentation
Below is an excerpt from a recent DataEndure event, “A Tale of 2 Micros: Microbrew and Microsegmentation” If you are scratching your head at the title of our most recent event, we’ll take a moment to clarify. Consider the large and growing attraction to the microbrew beer industry – consumers appreciate the diversity of flavor and other characteristics that are specific to their tastes. The craft succeeds because they are… Read More
4 Fundamentals for Business Continuity
When unexpected circumstances arise, you respond by mobilizing to support your employees, customers, and partners—all while preparing for what might happen next. For 35 years, DataEndure has been in the business of digital resilience – and we are here and available to help enable business continuity and progress during disruptive times. We can help you support remote-access workers, help ensure the availability of data and applications, and help you prepare for—and… Read More