Resources Categorized: Infrastructure

There are a total of (35) items.
Blog
A Case Against Layer 4 Security Tools
Blog
VPNs Are Killing Productivity
Micro-segmentation
Micro-segmentation is a security technique that involves dividing a large network into smaller, isolated segments at the application or workload level. Unlike traditional network segmentation , which divides a network into sub-networks at the network layer, micro-segmentation is focused on creating isolated, secure segments for individual applications or workloads. The goal of micro-segmentation i
Blog
A Close Read at NIST’s Definition of Zero Trust Architecture
North-South Traffic
North-south traffic refers to network traffic that enters or exits an organization's internal network, as opposed to traffic that occurs within the network (referred to as " east-west " traffic). The terms "north-south" and "south-north" are used to describe the direction of traffic flow in relation to an organization's network perimeter. North-south traffic typically refers to communication betwe
Cloud Network Security
Cloud network security refers to the measures taken to protect the confidentiality, integrity, and availability of data and systems in a cloud computing environment. This includes protecting the cloud infrastructure, virtualized systems, and communication channels used in cloud computing. Cloud network security measures may include firewalls, encryption, access control , monitoring, and threat det
IPsec: Tunnel Mode and Transport Mode
If you are looking to secure HTTPS-based applications, Pomerium is a better choice for speed, security, and ease-of-use. IPsec (Internet Protocol Security) is a protocol that provides security for IP-based communication. IPsec can operate in two modes: Tunnel Mode and Transport Mode. Tunnel Mode: In Tunnel Mode, the entire original IP packet is encapsulated in a new IP packet. The new packet is th
Software-Defined Networking (SDN)
Software-Defined Networking (SDN) is a network architecture that separates the control plane and the data plane in a network. The control plane is responsible for making decisions about how the network should operate, such as how data should flow and which routes should be used. The data plane is responsible for forwarding packets of data according to the decisions made by the control plane. In tr
Secure Sockets Layer (SSL)
SSL (Secure Sockets Layer) is a cryptographic protocol that was widely used to provide security for Internet communications. It was originally developed to secure the transfer of sensitive information such as credit card numbers and other personal data over the Internet. However, SSL has been replaced by a newer protocol, TLS (Transport Layer Security), which provides equivalent security features
Previous Page 3 of 4 Next

Revolutionize
Your Security

Embrace Seamless Resource Access, Robust Zero Trust Integration, and Streamlined Compliance with Our App.

Pomerium logo
© 2024 Pomerium. All rights reserved