by Tarun Desikan | Jun 17, 2022 | Blog
Co-author: Den Jones Do your employees complain about needing to use their corporate VPNs to access SaaS applications such as Microsoft Office 365, Google Workspace and Salesforce? Does your enterprise security model require backhauling traffic destined for SaaS...
by Tarun Desikan | Jun 15, 2022 | Blog
Co-author: Den Jones The last two pandemic years have been difficult for every department in every organization but, in many ways, IT / Networking has been the hardest hit. Two growing trends – (a) applications running in the cloud instead of on-premises, and (b) a...
by Tarun Desikan | Mar 31, 2022 | Blog
So, Okta was recently compromised. As is the case after every security incident, there has been a bunch of FUD – Techcrunch says the data breach has affected hundreds of Okta customers, the Hacker News crowd is up in arms, Cloudflare’s CEO says he is so disappointed...
by Tarun Desikan | Jan 7, 2022 | Blog, Integrations, Product Announcement
Originally published by Robert Ronan, Oracle Principal Product Manager. What is zero trust access? As more organizations migrate infrastructure to the cloud and rethink software development and deployment, they are also modernizing their approach to security. One such...
by Tarun Desikan | Jun 22, 2021 | Blog, Integrations
I’m excited to write more about Banyan Security’s new partnership with Microsoft to help accelerate enterprise Zero Trust security adoption. Today, most organizations are migrating their Identity and Access Management (IAM) away from traditional on-premises Active...
by Tarun Desikan | Jun 24, 2020 | Blog, How-To
This is the first in a series of blogs on “How To Zero Trust”, geared towards enterprise IT and security professionals. Our objective is to highlight real-world scenarios and practical solutions to improve the security posture of your organization toward Zero Trust...
by Tarun Desikan | Oct 23, 2019 | Blog
We’re excited to introduce a new capability in our Oct 2019 Release of the Banyan Zero Trust Network Access Platform – Passwordless Authentication with Zero Trust. Enterprise security can roll out least privilege access controls following Zero Trust principles,...
by Tarun Desikan | Jun 4, 2019 | Blog
Security teams today are bombarded with marketing around BeyondCorp and Zero Trust security. But what do these terms actually mean, how are the concepts related, and are such initiatives ready for enterprise adoption? A brief history of BeyondCorp and Zero Trust Let’s...
by Tarun Desikan | May 26, 2015 | Blog
Docker Hub is a central repository for Docker developers to pull and push container images. We performed a detailed study on Docker Hub images to understand how vulnerable they are to security threats. Surprisingly, we found that more than 30% of images in official...