• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Search Results: zero trust

DTEX Systems Achieves Record Growth as Demand for Workforce Cyber Intelligence & Security Skyrockets Year-Over-Year

March 15, 2022 TechDecisions Staff Leave a Comment

Innovation of Insider Risk Management Platform Encompassing UEBA, DLP and Zero Trust Enforcement Capabilities Drives Customer Adoption & Account Growth; Ecosystem Expansion Including Partnerships with MITRE, Splunk and CrowdStrike Accelerate Demand for DTEX InTERCEPT SAN JOSE, Calif.–(BUSINESS WIRE)–#DLP—DTEX Systems, the Workforce Cyber Intelligence & Security CompanyTM, today announced record setting growth, fueled by skyrocketing demand […]

Read More

Windstream Enterprise Delivers North America’s First and Only Comprehensive Managed SASE Solution with Cato Networks

March 15, 2022 TechDecisions Staff Leave a Comment

Windstream Enterprise’s convergence of networking and security addresses modern-day challenges of digital business transformation, cybersecurity and workforce mobility. LITTLE ROCK, Ark.–(BUSINESS WIRE)–Windstream Enterprise (WE), a leading managed communications service provider, announced North America’s first comprehensive managed Secure Access Service Edge (SASE) solution with Cato Networks. Windstream Enterprise is the first and only North American managed […]

Read More

Drata Risk Management

7 Security & Risk Management Trends IT Leaders Should Know

Security leaders must evolve their strategies to protect their organization's digital footprint against these emerging trends.

March 9, 2022 TD Staff Leave a Comment

Security and risk management leaders must evolve their strategies to protect their organization’s expanding digital footprint against new and emerging threats in 2022 and beyond, according to Gartner. The research firm has identified seven security and risk management trends leaders should know: Trend #1: Attack Surface Expansion Enterprise attacks are expanding and so are risks […]

Read More

Google, Bard

Google To Acquire Cybersecurity Leader Mandiant For $5.4 Billion

Google is acquiring Mandiant and is adding the firm's cybersecurity services to its Google Cloud portfolio in a $5.4 billion deal.

March 8, 2022 Zachary Comeau Leave a Comment

Google is acquiring Mandiant and is adding the cybersecurity defense and response firm’s services to its Google Cloud portfolio in a $5.4 billion deal. Mandiant, formerly part of cybersecurity firm FireEye and a reported target of Microsoft, will complement Google Cloud’s existing security offerings, including BeyondCorp Enterprise for Zero Trust and VirusTotal for malicious content […]

Read More

NSA Network Security

NSA: This Is How Admins Should Do Network Security

The National Security Agency has released a detailed guide to help administrators better secure their network.

March 7, 2022 Zachary Comeau Leave a Comment

With cybersecurity now the top concern for IT leaders and their team, dozens of organizations, including private companies, nonprofits, IT providers and cybersecurity vendors have released cyber-hardening guides over the last few years to help organizations secure their infrastructure. The U.S. Cybersecurity and Infrastructure Agency, in particular, has been a leading voice when it comes […]

Read More

Microsoft Security RSA Conference

Microsoft Extends Azure AD Identity Protection Into Workload Identities

Azure AD Identity Protection for workload identities includes purpose-built anomaly detection capabilities to protect the entire IT environment.

February 24, 2022 Zachary Comeau Leave a Comment

Microsoft has announced the public preview of Azure AD Identity Protection for workload identities that includes purpose-built anomaly detection capabilities for workload identities with user detections to help protect the entire IT environment. According to Microsoft, cloud migrations include software workloads like apps, services or scripts that access cloud resources and have workload identities in […]

Read More

Sysdig Security and Visibility Solutions Available for Oracle Cloud

February 22, 2022 TechDecisions Staff Leave a Comment

Now available in the Oracle Cloud Marketplace, the Sysdig platform gives Oracle Container Engine for Kubernetes users a unified view of the risk, compliance, and performance of cloud-native applications SAN FRANCISCO–(BUSINESS WIRE)–Sysdig, the unified container and cloud security leader, announced today that the Sysdig platform has been extended to support Oracle Cloud Infrastructure (OCI). With […]

Read More

Versa Networks Included in Gartner® Magic Quadrant™ Reports Covering WAN Edge Infrastructure (SD-WAN), Network Firewalls and Security Service Edge

February 18, 2022 TechDecisions Staff Leave a Comment

Versa Meets Rigorous Criteria by Gartner for Inclusion in Magic Quadrant Reports Related to Secure Access Service Edge (SASE) Due to its Ability to Execute and Completeness of Vision SAN JOSE, Calif.–(BUSINESS WIRE)–#MagicQuadrant–Versa Networks, the recognized secure access service edge (SASE) leader, today announced it has met rigorous criteria of Gartner for inclusion in three […]

Read More

McAfee Enterprise Security Service Edge (SSE) Portfolio Named a Leader in 2022 Gartner® Magic Quadrant™ for SSE

February 18, 2022 TechDecisions Staff Leave a Comment

McAfee Enterprise SSE Portfolio positioned furthest in entire Magic Quadrant for completeness of vision SAN JOSE, Calif.–(BUSINESS WIRE)–McAfee Enterprise Security Service Edge (SSE) portfolio has been positioned as a Leader in the 2022 Gartner “Magic Quadrant for Security Service Edge” and recognized in the 2022 Critical Capabilities for SSE for its MVISION Unified Cloud Edge […]

Read More

employee data access

More Than A Third Of Former Employees Still Have Access To Company Data

Beyond Identity research finds former employees still have access to company data, such as email, social media accounts, and the back end of the company website.

February 10, 2022 Alyssa Borelli Leave a Comment

Leaving a job isn’t as simple as returning company issued equipment and key cards anymore. More than a third of former employees still have access to their company data, according to latest research from Beyond Identity, a passwordless authentication platform provider. Beyond Identity surveyed 1,121 employees and employers across Ireland, the U.K. and the U.S. […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 12
  • Page 13
  • Page 14
  • Page 15
  • Page 16
  • Interim pages omitted …
  • Page 32
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.