End of an Era for VPN?

The legacy method of granting users access to applications in the enterprise is to extend the network perimeter to the client. This is achieved by routing the traffic between the client and the network edge in one secure tunnel. This approach poses a security risk as the user usually has full access to all network […]

Read More End of an Era for VPN?

A World without the Security Perimeter

The Enterprise IT landscape is changing with the adoption of mobility and cloud services, and enterprises need to change their architecture to meet the growing needs of securing users from anywhere on any device. Join in and be inspired by mobile security session at the Nordic Security Conference in Stockholm. Nordic ITSecurity 2016 Program The […]

Read More A World without the Security Perimeter