Build a smarter, stronger Zero Trust strategy; from understanding your current security posture to aligning with federal mandates.
Category: Zero Trust
Zero Trust Endpoints – Engineering and Operations Use Case
Overview The Department of Defense (DoD) Department of Defense Education Activity (DoDEA) Information Technology (IT) Division provides reliable and innovative technology solutions to support 80,000 military-connected users, consisting of approximately 60,000 students...
Exploring a Modern ICAM Solution with ZTA Principles
In late 2020, the U.S. federal government publicly reported a major cyberattack. The incident is widely believed to be committed by Russian-sponsored group Berserk Bear. At the time, Senate Minority Whip Richard Durbin referred to the intrusion as...