by Yoshio Turner | May 30, 2023 | Blog, Integrations
The cornerstone of a viable zero trust solution is that it must be able to successfully handle the wide variety of applications, both legacy and modern, that are being used within corporations today. While that statement seems obvious, it can be used to quickly...
by Yoshio Turner | Aug 24, 2022 | Blog, Improving Legacy Technology
Several of our customers are networking or security teams at companies with the following attributes: A growing remote workforce, e.g., 40%+ remote is common A mix of managed and unmanaged devices Contractors, partners, or third-party services that need access The...