article thumbnail

How customers can save money during periods of economic uncertainty

CIO Business Intelligence

To achieve this, businesses are turning to a zero-trust architecture, specifically the Zscaler Zero Trust Exchange. This is the second installment in our two-part blog series highlighting the ways in which Zscaler helps organizations overcome the challenges of perimeter-based architectures to deliver superior economic value.

article thumbnail

Your biggest barriers to digital transformation aren’t technical…they’re cultural

CIO Business Intelligence

It’s only about where we place our time, money, and energy. We even copied that perimeter defense strategy to our cloud environments by building virtual firewalls to control access to those applications. And not only in terms of architecture and technology. We need to usher in a revolution in infrastructure and security.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

How Orange’s CTO is driving network transformation

TM Forum

Prior to stepping up to the role of CTO in September 2021, Leboucher was Vice President Digital IT, Customer Relation Solutions and Global Architecture, Orange Labs Services, where he played an instrumental role in transforming Orange’s IT systems. 5G SA and Open RAN.

CTO 130
article thumbnail

Inflation Is Making Cybersecurity Even More Challenging for Leaders

SecureWorld News

Schultz offered these CISO tips regarding security awareness training: "Security education is essential for building and maintaining human firewalls in the organization. Does this tool integrate with our existing architecture (e.g., Can our current security tools address this issue, and if not, why? SIEM, SOAR)? In the U.S.,

Budget 79
article thumbnail

Technology Short Take #70

Scott Lowe

According to this article , “It is hard to overstate what a sea change” this sort of architecture will create. I saw two articles talking about his experience: one on redirecting NSX firewall logs into SmartLog and a second one ranting on how the NSX DFW isn’t quite enterprise ready. and Trend Micro’s Deep Security in this article.

Vmware 60
article thumbnail

Technology Short Take #77

Scott Lowe

Vivek Gite over at nixCraft explains how to use ufw (Uncomplicated Firewall) on Ubuntu to limit SSH connections. The post is a bit geeky but quite informative, and worth reading if SSH bastion hosts are a key part of your architecture. If you’re interested in learning more about some of the new security features in vSphere 6.5,

Linux 60
article thumbnail

VMworld 2014 Day 2 Keynote

Scott Lowe

Fathi re-emphasizes that VMware’s SDDC vision is an architecture, one built on the “power of AND.” ” vCloud Suite (and vCloud Air) is a manifestation of the SDDC vision/architecture. VMware’s SDDC vision/architecture delivers the power of “AND.” deploying a blueprint.

Vmware 63