Welcome to the RESILIANT Blog

Learn more about how RESILIANT SDP is changing the is improving the efficiency and effectiveness of security operations.

 

NEW NORMAL – Identity is the New Perimeter

One thing we can all agree on: more computing assets reside outside enterprise infrastructure. While executives come to terms with the fact that cybersecurity risk is increasing, these computing assets are beyond legacy security controls. Adapting to change and...

Think of SDP as a Private Application VPN

Over the last nine months, we’ve seen unprecedented growth in the number of corporate employees working away from the office. Many rely on VPNs for connectivity; IT Security and Network Ops trust the Virtual Private Networks with their cadre of external and internal...

Zero Trust and the Software Defined Perimeter

It makes more sense when you understand the role of “Dynamic Enforcement”  Last week I came across another article educating readers on the advent of Zero Trust architecture (ZTA) and how it represents a new paradigm for securing critical applications and data -...

Software-Defined Perimeter – Trick or Treat?

Have you been hearing about Software-Defined Perimeters (SDP) and wondering what all the fuss is about? Are you reading about Zero Trust as the next great security paradigm but wondering if any organization has successfully implemented a zero trust model? On October...