Tag: Zero Trust

MSPs need to lean into zero-trust IT
There’s a lot of hype surrounding zero-trust IT as a buzzword, but at the most fundamental level it’s all about ensuring security based on a known identity of an end user, application, or device. Forrester Research analyst John Kindervag is...

Zero Trust, XDR, and digital transformation: Interview with Fleming Shi
For anyone involved in tech and security, it’s hard to avoid a blizzard of messaging and advertising around Zero Trust Network Access (ZTNA) and Extended Detection and Response (XDR). But it can be remarkably difficult to understand exactly what a...

Zero-trust IT transition requires MSP prudence
Gartner is predicting that while 60 percent of organizations will embrace zero-trust as a starting point for security by 2025, more than half will fail to realize the benefits. In that same timeframe, however, 80 percent of enterprises will as...

Zero-trust IT creates major opportunity for MSPs
Interest levels in approaches to creating zero-trust IT environments are now reaching a zenith. A survey of 800 IT and security professionals, conducted by The Cloud Security Alliance (CSA), finds 94 percent of respondents are in the process of implementing...

MSPs have a vested security interest in driving infrastructure upgrades
A survey of 1,406 individuals in the U.S., Europe, Middle East, Africa, and Latin America, who influence their organization’s information technology (IT) decision-making regarding investment in security technologies and infrastructure, finds nearly two-thirds (64 percent) are more likely to purchase...

In MSPs most organizations will zero-trust
Zero-trust is not a new idea when it comes to cybersecurity, but after a series of high-profile breaches over the past two years, it is all the rage. The concept itself traces its history all the way back to 1994...

MSPs should expect remote work to be here to stay
A survey of 402 executives and technology professionals in the U.S. conducted by Dimensional Research on behalf of ManageEngine, a unit of ZoHo that provides an IT operations platform, suggests managed service providers (MSPs) will be supporting large numbers of...

Remote work cybersecurity: Choosing between VPN and ZTNA
With many businesses accepting remote and hybrid work models, businesses are now looking to MSPs to evaluate the long-term sustainability of their existing cybersecurity infrastructure to ensure their businesses are protected. For many, this means turning from existing cybersecurity protections...

How will the new Executive Order implementing ZTNA impact MSPs
Following the Colonial Pipeline attack, one of the most impactful ransomware attacks to-date, the United States government issued an Executive Order which detailed a course of actions aiming to improve the government’s cybersecurity standards, specifically with zero-trust (ZTNA) security. The...

MSPs (and SMBs) can benefit from zero trust cybersecurity
The way network security has tended to work is you have a set of people you trust like employees, who you usually let in via username and password. This approach worked great when everyone was inside the firewall, but we...