If you’ve been looking for a Security Service Edge (SSE) solution, especially ZTNA or VPN as-a-service, then you’ve most definitely heard the term PoP. Most vendors are quick to emphasize the number of PoPs they offer, and some have started talking about dynamic PoPs. With so many market and customer questions around PoPs, I thought I’d spend some time on the subject.
Improved User Experience
Welcome to our release highlights blog, where we delve into the exciting world of Banyan Security and uncover the release highlights for the month of June. In this fast-paced digital era, ensuring the utmost security has become paramount. Banyan Security has been at the forefront of providing innovative solutions that safeguard organizations against ever-evolving threats, […]
Let’s talk about the darker side of the ChatGPT security story: a recent DarkReading report found that 4% of workers are leaking protected corporate information into AI tools by feeding schematics, statistics, instructions, and other intellectual property into large language learning models (LLMs). ChatGPT security took center stage in April 2023 when Samsung employees leaked […]
The way we work has changed dramatically over the past few years. Gone are the days when we all worked in a centralized office, using only company-owned devices to access company applications and data. Today’s workforce is distributed, and people use a variety of devices to access work resources, from laptops and smartphones to tablets […]
Device trust has come a long way, and is evolving even faster, stimulated by integrations and vendors that are developing device-centric solutions. But it wasn’t always this way… in the early networking days, a device that didn’t have a user (for example, a printer) would be put on a segmented network that wasn’t even secured. […]
Oh, network-centered security. What a brilliant idea. Let’s put all our faith in the network and forget about those pesky little devices that connect to it. Who needs to worry about laptops, tablets, and smartphones, anyway? They’re just small, insignificant pieces of technology that have absolutely no bearing on our security. Device-centricity? Maybe it’s a […]
The idea of customer self-service has been around since 1833 when Percival Everett’s first self-service vending machines appeared in London, selling postcards. But when it comes to IT, many organizations find self-service daunting (though they agree it can be a path to increasing productivity and profits while reducing costs). Self-service, at its best, allows users […]
Banyan recently announced a new granular trust scoring feature, called Trust Effect, for device trust and security posture. Here is how it works.
Let’s look at some of the leading vendors of well-known legacy VPN products and compare them to Banyan Security’s Zero Trust Network Access (ZTNA) solution featuring Service Tunnel. Limits of legacy VPN deployments Vendor Product Cisco ASA / AnyConnect Palo Alto Networks GlobalProtect Ivanti (Pulse Secure) Pulse Connect Secure Check Point Software Technologies Quantum VPN […]
We’ve made some enhancements to our self-service offering and we’re convinced that intent-based onboarding will be a leading conduit to the successful first time user experience. This post is to share more about what we did, why, and some lessons learned along the way! Great onboarding flows orient around outcomes A key goal at Banyan […]
Imagine eliminating the 90-day password change rule while cutting help desk password-related tickets by 60-80%!
Discover and Publish is a quick and effective way to create least-privileged access to your infrastructure and services.