• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Search Results: zero trust

Business email compromise

Business Email Compromise is on the Rise

Business email compromise attacks are increasing in sophistication, allowing attackers to quietly take over email accounts, Microsoft says.

May 22, 2023 Zachary Comeau Leave a Comment

Business email compromise has emerged as a critical threat as threat actors shift their tactics and increase the sophistication of attacks designed to takeover business emails, including leveraging residential IP addresses to hide the attacks, Microsoft says in a new Cyber Signals report. The report, the fourth such edition of Microsoft’s cybersecurity research report, finds […]

Read More

Zerto 10, ransomware

Zerto Launches Zerto 10 for Enhanced Disaster Recovery, Ransomware Mitigation

Zerto 10 is a new disaster recovery solution designed to enhance disaster recovery and detect encryption in real time.

May 18, 2023 Zachary Comeau Leave a Comment

Disaster recovery and ransomware resilience firm Zerto is launching Zerto 10 for Microsoft Azure, a new disaster recovery solution designed to enhance disaster recovery and mobility for complete infrastructure flexibility. The company also unveiled new real-time encryption and detection features and a new air-gapped recovery vault to help mitigate a ransomware attack. According to the […]

Read More

Microsoft Teams attack

Research: Microsoft Teams Can Be Used for Malware Delivery

Microsoft Teams is now one of the 10 most targeted sign-in applications in Microsoft 365 and can be abused by attackers, Proofpoint says.

May 18, 2023 Zachary Comeau Leave a Comment

It is common knowledge that Azure, PowerShell, Exchange and other Microsoft Tools and services are popular targets of threat actors, but Microsoft Teams is emerging as one of the most targeted Microsoft applications for attackers. According to enterprise security firm Proofpoint, Microsoft Teams is now one of the 10 most targeted sign-in applications, with nearly […]

Read More

SASE, SASE approaches, SASE implementation

SASE Adoption and Different Approaches to Implementation

SASE is a solution to the increasing complexity of IT infrastructure, but there are a few different approaches.

May 17, 2023 Zachary Comeau Leave a Comment

With employees accessing corporate resources and logging on from anywhere, organizations are now shifting to a secure access service edge (SASE) approach to deliver converged network and security-as-a-service designed to support branch offices, remote and on-premises secure access use cases. According to Gartner, SASE includes SD-WAN, SWG, CASB, NGFW and enables zero trust access based […]

Read More

Zero Trust, Leostream, AWS

Leostream Announces ZTNA Platform for AWS

Leostream ZTNA-enabled Remote Access Desktop Platform is designed to enhance the security and management of end user workloads in AWS.

May 16, 2023 Zachary Comeau Leave a Comment

Remote desktop access provider Leostream is launching a federated identity management solution with Zero Trust Network Access (ZTNA) for AWS. According to the Boston-based firm, its is launching federated identity management with ZTNA for secure remote computing designed to protect and connect users across virtual desktop infrastructure, desktops-as-a-service and end-user applications in AWS environments. The […]

Read More

Spectrum Enterprise, Cisco

Spectrum Enterprise Leverages Cisco Security Tools in New Offerings

Secure Access with Cisco Duo and Cloud Security with Cisco+ Secure Connect will integrate with Spectrum's managed network services portfolio.

May 9, 2023 Zachary Comeau Leave a Comment

Spectrum Enterprise is adding two new security offerings developed through a collaboration with Cisco to its cybersecurity offerings, giving organizations an easy way to provide employees and other stakeholders with safe and secure access to information and applications on networks or private clouds. The new offerings, Secure Access with Cisco Duo and Cloud Security with […]

Read More

AWS Amazon Security Lake

AWS Verified Access is Now Generally Available

AWS Verified Access is a networking service that uses zero trust principles to give organizations secure access to applications without a VPN.

May 2, 2023 Zachary Comeau Leave a Comment

Amazon Web Services is launching the general availability of AWS Verified Access, a new networking service designed to use zero trust principles to give customers secure access to corporate applications without a VPN. According to the company, AWS Verified Access reduces the risks associated with remote connectivity by enabling customers to implement a work-from-anywhere model […]

Read More

Palo Alto Networks Prisma SASE Accenture

Accenture, Palo Alto Networks Launch Joint SASE Solutions, Services

The joint SASE solutions from Accenture and Palto Alto Networks bring reduced complexity and greater efficiencies with fewer vendor tools.

April 26, 2023 Zachary Comeau Leave a Comment

Accenture and Palo Alto Networks are partnering to deliver joint SASE solutions powered by Palo Alto Networks’ AI-powered Prisma SASE solution to help organizations improve their security posture while accelerating their digital transformation efforts. Like other SASE solutions designed to solve the complexity that remote work and multi-cloud environments have introduced, the companies hope to […]

Read More

Passwordless

RSA to Launch Governance & Lifecycle 8.0 With New Dashboarding

RSA is launching enhancements to its Unified Identity Platform, including the next version of its RSA Governance and & Lifecycle solution.

April 25, 2023 Zachary Comeau Leave a Comment

Identity security provider RSA is launching enhancements to its Unified Identity Platform that include the next version of its RSA Governance & Lifecycle solution that will feature a new dashboarding framework and integration gamification to accelerate duties. According to the Bedford, Mass.-based company, it is improving its Unified Identity Platform because point identity solutions are […]

Read More

VMware DEX

VMware Launches New Solutions for Multi-Cloud Security

New VMware security tools and services are designed to help secure multi-cloud and hybrid work environments.

April 24, 2023 Zachary Comeau Leave a Comment

VMware is launching new security capabilities to help bring strong lateral security across multi-cloud environments to give organizations more visibility into threats, including new IT phishing protections and IT management features in Workspace ONE, new features for Carbon Black, an enhanced firewall service, and more. DPU-based Acceleration Highlighting the company’s announcement on the first day […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 5
  • Page 6
  • Page 7
  • Page 8
  • Page 9
  • Interim pages omitted …
  • Page 32
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.