Vidder Blog

Snowball EC2 + vSphere: 2nd Generation Hybrid Infrastructure

Posted by Junaid Islam on Jul 18, 2018 4:48:59 PM

The recent announcement by AWS of a physical Snowball EC2 compute platform represents a significant step forward in hybrid cloud/data center computing. When combined with a SDP-based Zero Trust Network, enterprises now have an infrastructure solution that offers a better cost structure, agility and security than any other design.

Read More

Topics: AWS secure enclave, application security

Secure Enclave: Zero Trust Network For The Cloud-based Enterprise

Posted by Junaid Islam on May 29, 2018 11:20:21 PM

In the second of a series of blog posts on a Cloud-based Enterprise, we’ll examine how a Secure Enclave utilizes a Zero Trust Network to protect itself from cyberattacks.

Read More

Topics: network security, Multifactor Authentication, trust assessment, Vidder secure enclave

Security and the “All or Nothing” Paradox

Posted by Mark Hoover on May 21, 2018 4:33:57 PM

Mental inertia. That’s what it is. I have noticed that most professionals contributing to enterprise network security continue to operate under the following tenets which have shaped their behaviors for decades:

  • The corporate network is vastly important.
  • It is critical to secure all aspects of this vastly important resource.
  • Embedding security into the network is the most efficient way to achieve the desired level of security in this vastly important environment.

Three decades of adhering to these tenets have resulted in highly connected global company operations, but at a very high cost accompanied by rapidly diminishing security.

Read More

Topics: network security, Vidder, CISO, security, innovator’s dilemma

MFA is too Important to be Moving Sideways

Posted by Mark Hoover on May 9, 2018 5:29:03 PM

According to the 2017 Verizon Data Breach Investigations Report “81% of hacking-related breaches leveraged either stolen and/or weak passwords.”    A solution to this problem is to use Multifactor Authentication to prevent a stolen password from being enough for an adversary to gain access to critical systems.  This has been true for a long time.  Yet MFA is still only used for specific use cases, like remote access. And even there, not universally.  Why is this?  It is because MFA has traditionally been what social scientists call “a pain-in-the-ass” for both users and IT.  

Read More

Topics: MFA, trusted access control, Multifactor Authentication, Endpoint Security, BYOD Security

The CIO’s Inevitable Strategic Withdrawal

Posted by Mark Hoover on Apr 13, 2018 5:43:25 PM

The corporate network, once a great enabler of business productivity, is rapidly becoming an obstacle. This is leaving CIOs with no choice but to make a strategic withdrawal away from defending global and integrated corporate networks, towards more secure-able and relevant perimeters.  There is no other way forward.

Read More

Topics: security, segmentation

Secure Enclave: Foundation For The Cloud-based Enterprise

Posted by Junaid Islam on Apr 11, 2018 2:01:45 PM

This is the first in a series of blog posts examining the Cloud-based Enterprise. In this post we’ll introduce how a Secure Enclave can help enterprises migrate to a pure cloud-based operational model.

Read More

Topics: Vidder secure enclave, AWS secure enclave, software defined perimeter

Securing Office 365 / SaaS

Posted by Greg Ness on Apr 2, 2018 3:39:52 PM

Interested in learning how adversaries are attacking SaaS?  Check out this new Vidder white paper: Securing Office 365 and other SaaS.

Read More

Topics: Securing Office 365

Segmentation: Where to Begin?

Posted by Greg Ness on Feb 15, 2018 1:03:18 PM

A New Paper Suggests it’s Time to Think Differently about Segmentation

The perimeter protecting the network, once considered impregnable, has been degraded by advanced threats and an explosion in the number of connected devices (and apps running on them) and a new generation of predatory malware attacks.

Since the dawn of the networking era, enterprises built open (flat) networks to offer every user access to (almost) every application. Many of these networks are global, spanning business units and national boundaries with unprecedented connectivity. Amazing. Powerful. Everything and everyone is accessible.

Read More

Topics: segmentation, security

About Vidder

Vidder is changing how modern day enterprises approach security in an increasingly untrusted IT landscape. PrecisionAccess™ enables secure, trusted access to critical business applications in today’s perimeterless enterprise. With PrecisionAccess, enterprises can continue to evolve their business ecosystem through major IT trends like cloud migration and outsourcing with assurance that their most valuable applications are safe.

Subscribe to Email Updates

Recent Posts