Announcing: Pomerium & FleetDM integration.
Register for the webinar here.

Resources Categorized: Infrastructure

There are a total of (35) items.
Virtual Private Network (VPN)
Virtual Private Network (VPN) is a technology in cybersecurity that creates a secure, encrypted connection between a device and a remote server over the internet. VPNs are used to provide secure remote access to a private network, such as an organization's internal network, by encapsulating and encrypting all data transmitted between the device and the remote server. This helps to protect sensitiv
Single Sign-On (SSO)
Single Sign-On (SSO) is an authentication method that enables users to access multiple applications or services with a single set of credentials (username and password). Instead of having to log in to each individual service separately, SSO provides a centralized authentication mechanism, which verifies the user's identity once and then grants access to all authorized services and applications. SS
Software Defined Perimeter (SDP)
Software Defined Perimeter (SDP) is a security architecture that provides secure, authenticated access to networked resources. The key concept of SDP is that access to resources is dynamically granted only to authenticated and authorized users, based on the principle of "need to know." In an SDP architecture, network resources are hidden behind an "air gap" and are not directly accessible from the
Software-Defined Wide Area Network (SD-WAN)
Meta Commentary: SD-WAN providers are starting to bundle up their services into SASE solutions. While this is an understandable evolution, practitioners and decisionmakers are encouraged to read our Buyer's Guide to better evaluate vendors selling SASE. Definition: A Software-Defined Wide Area Network is a network architecture that uses software-defined networking (SDN) technologies to manage the
Secure Web Gateway (SWG)
A Secure Web Gateway (SWG) is a network security solution that monitors and controls access to the Internet, including web traffic and web applications, to protect against threats and enforce organizational policies. An SWG typically provides features such as URL filtering, content inspection, malware protection, data loss prevention, and SSL/TLS encryption inspection, to secure internet access an
Bastion Host
A bastion host is a server or a device that is deliberately exposed to the Internet and used to access an internal network. It serves as a secure gateway or entry point for remote access to the internal network, typically via SSH or RDP. It often hosts a single application for this purpose, usually a reverse proxy or load balancer. Bastion hosts are often hardened and secured with additional secur
Blog
Log4J and the Fragility of Modern Infrastructure
Previous Page 4 of 4 Next

Revolutionize
Your Security

Embrace Seamless Resource Access, Robust Zero Trust Integration, and Streamlined Compliance with Our App.

Pomerium logo
© 2024 Pomerium. All rights reserved