Security Can’t Keep Up, or Can It?

Evan Mintzer was a recent guest on Gestalt IT’s On-Premise IT Roundtable podcast. The premise discussed was whether with the seemingly endless number of threats out there, if security can actually catch up. It was a great conversation, and Evan further explains his thoughts on the premise in this blog post.

The Name’s the Thing With Guardicore

Having trouble memorizing all the IP addresses in your network? Still trying to build security policies based on VLANS? Maybe what you need is to give a name to your pain with some labels and a little help from Guardicore. Tom Hollingsworth looks at what the company presented at Security Field Day in this piece.

Monitoring Cloud Network Traffic With ExtraHop

If you’re moving data to the cloud, you need visibility to ensure you’re secure. Tom Hollingsworth talks about ExtraHop Reveal(x) and how they can provide the visibility you need no matter where your data lives.

Malware Microsegmentation With Illumio

Are you worried that your patches are going to cause more problems than they solve? Wish you could just lock down the vulnerable systems until you know what’s going to happen? Tom Hollingsworth looks back at Illumio’s presentation during Security Field Day to see how microsegmentation can help you sleep soundly at night.

Stopping Security Silos With Palo Alto Networks Cortex

Security silos can make us miss the important things. Tom Hollingsworth heard from Palo Alto Network at Security Field Day and looks at Cortex and how it can help us get better results from our data without the silos getting in the way.

Banyan and Zero Trust in a Post VPN World

At Security Field Day, Nate Avery heard from Banyan. They offer a VPN alternative built on the idea of bringing the least privilege access model to remote access. Instead of setting a list of patch requirements like older secure remote access solutions, Banyan uses reputation scores to determine worthiness of access, can work with mobile devices, and can continuously check the posture of a device. Nate think the security and efficiency implications of this might make it the approach to use in the future.