7 results in Reports
Sort by:
Refine
  • Chase Cunningham

Search Results

  • For Security & Risk Professionals

    Report

    Report The Zero Trust eXtended (ZTX) Ecosystem

    Extending Zero Trust Security Across Your Digital Business
    January 19, 2018 | Chase Cunningham

    Security pros are still scrambling for new and effective ways to protect their networks and combat the impacts of hacking and exploitation. With Forrester's Zero Trust Model of information...

  • For Security & Risk Professionals

    Report

    Report Five Steps To A Zero Trust Network

    Road Map: The Security Architecture And Operations Playbook

    A Zero Trust (ZT) architecture abolishes the idea of a trusted network inside a defined corporate perimeter. Zero Trust mandates the creation of microperimeters of control around an enterprise's...

  • For Security & Risk Professionals

    Report

    Report Develop Your Zero Trust Workforce Security Strategy

    Strategic Plan: The Security Architecture And Operations Playbook
    December 5, 2017 | Chase Cunningham

    The concepts and practices that enable a Zero Trust network are well established. While your extended networks and infrastructure are more secure, you still have a final hurdle to clear to achieve...

  • For Security & Risk Professionals

    Report

    Report The Eight Business And Security Benefits Of Zero Trust

    Business Case: The Security Architecture And Operations Playbook
    November 1, 2017 | Chase Cunningham, Jeff Pollard

    In response to increasingly complex cyberattacks, security pros devote resources to granular aspects of their networks. This is understandable and necessary to a degree, but it's also a great way...

  • For Security & Risk Professionals

    Report

    Report Artificial Intelligence Will Revolutionize Cybersecurity

    But Security Leaders Must View All Vendor Claims With Skepticism

    Security vendors are inundating CISOs with products purporting to use artificial intelligence to dramatically improve the accuracy and speed of both threat detection and response. However, much of...

  • For Security & Risk Professionals

    Report

    Report Protect Your Digital Workforce With Browser Isolation Technology (BIT)

    BIT Helps S&R Pros Implement Zero Trust For Workforce Security
    July 21, 2017 | Chase Cunningham

    Employees today must use a browser to access most of their corporate applications, email, and collaboration tools. A variety of common threat vectors target basic user interactions as employees use...

  • For Security & Risk Professionals

    Report

    Report Hardcoded For Failure

    Ignoring The Hardware, Firmware, And Code Running Our Networks Guarantees A Cyberattack
    June 21, 2017 | Chase Cunningham

    There is a plethora of security solutions to protect endpoints, mobile devices, and employees, but there is a deeper threat vector security pros often ignore. This threat is built into the very...