ZTNA as a Service: Guarantee business continuity in any situation If Covid-19 proved that allowing remote access to the information system was essential to the continuity of an organization’s activity, the multiplication of cyber attacks and the constant evolution of needs show the importance of ZTNA as a Service. ZTNA (Zero Trust Network Access) allows to secure remote access by applying the principle of least privilege. Its deployment as a cloud service allows it to adapt to the need for flexibility of companies that must deal with external constraints and… Read More >>
The new security perimeter for organizations Slowly but surely, we are experiencing a radical change in the world of networks and access security. To illustrate this in a caricatured way, we are moving from a situation when an organization’s network was inside its walls and the Internet outside, to a situation where everything is based on the Internet, which is shared by all organizations’ networks. The networks of companies are now permanently installed in the Internet network via cloud infrastructures that go beyond the physical boundaries… Read More >>
What measures should be implemented to secure teleworking? Today, more than ever, the way organizations manage to secure teleworking has an impact on the overall security of information systems. Teleworking is no longer a project or a temporary exception; it is now strongly anchored in organizations’ practices and represents an additional challenge for IT departments: it is no longer a question of being able to secure the remote accesses of certain employees on a temporary basis, but rather of being able to secure the remote accesses to the… Read More >>
Secure Access Service Edge: A Paradigm Shift The network and network security world is experiencing, like any other technology, its digital revolution. The traditional vision of “inside the firewall” and “outside the firewall” has been shattered: Internet has become the network of the extended enterprise. Secure Access Service Edge: Trends Leading to a Paradigm Shift Moving from a “network-centric” architecture to a “user-centric” and “application-centric” architecture. On the one hand, the cloud and the decentralization of servers and applications in disparate clouds; on the other hand, the… Read More >>
The human face of the workplace A world without users? “Automation”, “DevOps”, “Robotic Process Automation” (RPA), bots, chatbots and other robots, “artificial intelligence” (AI), … According to some people, users will disappear from the scene: the omnipresence of computing, called “digital”, will eventually replace them, do everything for them, and even do more and better than they do. Clearly, as the French song goes, “we are very little things, …”. Will dematerialization go so far as to dematerialize the user? Is there anyone still behind the… Read More >>
The History of Uberization The usage of the word “uberize” should be a source of endless amusement for contemporary wordsmith. Today, any new product, as long as it’s the slightest bit digital, will be deemed uberized, which at first glance, will immediately terrorize the competitors that brace themselves on archaic methods and create admiration of crowds swooning before such creative daring. Don’t laugh! Soon, term will be so generalized it will be found on our school playgrounds! Imagine that shortly, in the evening, the… Read More >>
Cloudifying the uncloudifiable! “My company’s apps are cloudifiable, super-cloudifiable in fact”. Unfortunately, repeating this phrase over and over is never going to result in a miracle. Launching an IT system into stratospheric orbit remains a complex topic. Of course, if you start with a blank canvas or if you only move forward gradually, the cloud ceiling will be lower, with the propulsion required to breach it consequently less too. Having effective solutions to the key issues of control, management, governance and change management… Read More >>