by Ashur Kanoon | May 9, 2023 | Blog, How-To, Use cases
In the third part of our VPN as-a-service (VPNaaS) video blog series, Ashur Kanoon takes us through a 3-minute tunnel discovery and configuration using Banyan Security. [Transcript] In this video, we’re going to look at tunnel discovery for a VPN as-a-service...
by Ashur Kanoon | May 8, 2023 | Blog, How-To, Use cases
In this 5-minute video blog, Ashur Kanoon takes us through VPN as-a-service (VPNaaS); see how easy it is from configuration to deployment in our VPNaaS tunnel demo. [transcript] Welcome to the Banyan Security VPNaaS demo. In this demo, you’ll see from deployment...
by Ashur Kanoon | May 4, 2023 | Blog, How-To, Use cases
Let’s look at migrating to VPNaaS (VPN as a Service) and examine the benefits and considerations for migration. Watch Ashur Kanoon below as he demonstrates the key factors you should be keeping in mind (plus considerations other vendors might hide). [transcript] So...
by Ashur Kanoon | May 2, 2023 | Blog, Improved User Experience, Improving Legacy Technology
Device trust has come a long way, and is evolving even faster, stimulated by integrations and vendors that are developing device-centric solutions. But it wasn’t always this way… in the early networking days, a device that didn’t have a user (for example, a printer)...
by Ashur Kanoon | Apr 19, 2023 | Blog
How much something costs has been a historical source of tension and irritation for consumers when buying stuff. We’ve all been there – not getting straight answers when trying to buy a car, finding out that your new no-fee credit card has all kinds of penalties and...
by Ashur Kanoon | Mar 28, 2023 | Blog, Use cases
“Zero Trust” is a cybersecurity framework and philosophy that assumes no user, device, or network can be inherently trusted. Instead, it requires the verification of every user and device attempting to access resources on a network, regardless of their location,...
by Ashur Kanoon | Mar 22, 2023 | Blog
Last year in 2022, there were 1,802 data compromises affecting more than 422 million people – but the LastPass data breach is the one that has security practitioners chatting. The original incident happened in August of 2022. Initially, we were told it was a “minor”...
by Ashur Kanoon | Feb 28, 2023 | Blog, Improved User Experience
The idea of customer self-service has been around since 1833 when Percival Everett’s first self-service vending machines appeared in London, selling postcards. But when it comes to IT, many organizations find self-service daunting (though they agree it can be a path...
by Ashur Kanoon | Feb 23, 2023 | Blog
Virtual Private Networks (VPN) have been widely used as a solution for secure remote access for decades. However, as organizations have come to rely more fully on remote access as a strategic part of their business, legacy VPNs have been showing their evident...
by Ashur Kanoon | Feb 16, 2023 | Blog, Use cases
Protecting users against malicious sites and enabling acceptable use policy (AUP) may be accomplished using some basic tools, however, modern organizations don’t have the resources or time to discover, track, and analyze millions of domains. Banyan Security’s Internet...
by Ashur Kanoon | Feb 14, 2023 | Blog
So you’re in charge of your organization’s DNS and hybrid access, and part of the job is providing DNS records to make systems easily accessible but you also need to make sure that you’re preventing spoofed domains, which can lead to a security breach. The first...
by Ashur Kanoon | Feb 7, 2023 | Blog, Improving Legacy Technology
With IPSec, SSL, TLS, VPN, SDP, and ZTNA tunnels, it may sometimes become confusing to figure when to use which. IPSec was mostly used for site-to-site VPN and we’re going to focus on remote access. Clearly, there are different types of tunnels and different ways...