Vidder Blog

The CIO’s Inevitable Strategic Withdrawal

Posted by Mark Hoover on Apr 13, 2018 5:43:25 PM

blog-man-umbrellaThe corporate network, once a great enabler of business productivity, is rapidly becoming an obstacle. This is leaving CIOs with no choice but to make a strategic withdrawal away from defending global and integrated corporate networks, towards more secure-able and relevant perimeters.  There is no other way forward.

Read More

Topics: security, segmentation

Secure Enclave: Foundation For The Cloud-based Enterprise

Posted by Junaid Islam on Apr 11, 2018 2:01:45 PM

This is the first in a series of blog posts examining a cloud-based enterprise. In this post we’ll introduce how a Secure Enclave can help enterprises migrate to a pure cloud-based operational model.

Read More

Topics: software defined perimeter, AWS secure enclave, Vidder secure enclave

Securing Office 365 / SaaS

Posted by Greg Ness on Apr 2, 2018 3:39:52 PM

Interested in learning how adversaries are attacking SaaS?  Check out this new Vidder white paper: Securing Office 365 and other SaaS.

Read More

Topics: Securing Office 365

Segmentation: Where to Begin?

Posted by Greg Ness on Feb 15, 2018 1:03:18 PM

A New Paper Suggests it’s Time to Think Differently about Segmentation

The perimeter protecting the network, once considered impregnable, has been degraded by advanced threats and an explosion in the number of connected devices (and apps running on them) and a new generation of predatory malware attacks.

Since the dawn of the networking era, enterprises built open (flat) networks to offer every user access to (almost) every application. Many of these networks are global, spanning business units and national boundaries with unprecedented connectivity. Amazing. Powerful. Everything and everyone is accessible.

Read More

Topics: security, segmentation

What Happens in Ukraine Doesn’t Stay in Ukraine

Posted by Greg Ness on Feb 12, 2018 6:05:54 PM

Second Panel on Ukraine Held at GWU

Last fall we discussed how digital societies are more vulnerable to cyber mayhem and cited the recent Future in Review panel on Ukraine’s cyber war. Last week a follow-on panel was held at George Washington University: The U.S.-Ukraine Cybersecurity Partnership.

Opening remarks from Frank Cilluffo, Director of the Center for Cyber and Homeland Security, and Dr. Leo M. Chalupa, Vice President for Research at George Washington University, highlighted that whatever threats Ukraine faces will eventually be seen globally. 

Read More

Topics: cyberwar, Ukraine

Protect Controlled Unclassified Information (CUI) From Cyberattacks

Posted by Junaid Islam on Dec 27, 2017 11:18:51 PM

Due to increased cyberattacks on the US government supply chain DHS has now mandated protecting Controlled Unclassified Information (CUI) using NIST 800-171. While at first this may seem like a daunting task with a bit of planning implementing NIST 800-171 is very manageable.

Read More

Topics: AWS secure enclave, US National Cybersecurity, NIST 800-171

How to Build a Secure Enclave on AWS

Posted by Greg Ness on Nov 27, 2017 6:00:00 AM

Over the last few years there has been significant security improvements in public clouds.  For example, AWS now offers transparent data encryption, key management and secure compute features. Unfortunately, even with the advances in public cloud computing, organizations like financial institutions have been unable to leverage these services because many analysts work in secure facilities that have no Internet access.

Read More

Topics: software defined perimeter, secure enclaves, AWS secure enclave, confidential cloud, reinvent2017

Vidder Can Help You Protect Applications from Untrusted Users

Posted by Greg Ness on Nov 17, 2017 9:05:00 AM

PrecisionAccess can be a force multiplier for your security team by future proofing your existing infrastructure against advanced attacks, including credential theft, predatory malware and man-in-the-middle. Software Defined Perimeter and Trust Assessment technology combine to obfuscate servers until user and device trust is established and access is granted to a single application or groups of applications.

Read More

Topics: software defined perimeter, trust assessment, application security

About Vidder

Vidder is changing how modern day enterprises approach security in an increasingly untrusted IT landscape. PrecisionAccess™ enables secure, trusted access to critical business applications in today’s perimeterless enterprise. With PrecisionAccess, enterprises can continue to evolve their business ecosystem through major IT trends like cloud migration and outsourcing with assurance that their most valuable applications are safe.

Subscribe to Email Updates

Recent Posts