Announcing: Pomerium & FleetDM integration.
Register for the webinar here.

Resources Categorized: Network Security

There are a total of (25) items.
Cloud Access Security Broker (CASB)
Meta Commentary: CASB providers are starting to bundle up their services into SASE solutions. While this is an understandable evolution, practitioners and decisionmakers are encouraged to read our Buyer's Guide to better evaluate vendors selling SASE. Definition: A Cloud Access Security Broker (CASB) is a security solution that provides security and compliance enforcement for cloud services. CASBs
Software Defined Perimeter (SDP)
Software Defined Perimeter (SDP) is a security architecture that provides secure, authenticated access to networked resources. The key concept of SDP is that access to resources is dynamically granted only to authenticated and authorized users, based on the principle of "need to know." In an SDP architecture, network resources are hidden behind an "air gap" and are not directly accessible from the
Software-Defined Wide Area Network (SD-WAN)
Meta Commentary: SD-WAN providers are starting to bundle up their services into SASE solutions. While this is an understandable evolution, practitioners and decisionmakers are encouraged to read our Buyer's Guide to better evaluate vendors selling SASE. Definition: A Software-Defined Wide Area Network is a network architecture that uses software-defined networking (SDN) technologies to manage the
Secure Web Gateway (SWG)
A Secure Web Gateway (SWG) is a network security solution that monitors and controls access to the Internet, including web traffic and web applications, to protect against threats and enforce organizational policies. An SWG typically provides features such as URL filtering, content inspection, malware protection, data loss prevention, and SSL/TLS encryption inspection, to secure internet access an
Bastion Host
A bastion host is a server or a device that is deliberately exposed to the Internet and used to access an internal network. It serves as a secure gateway or entry point for remote access to the internal network, typically via SSH or RDP. It often hosts a single application for this purpose, usually a reverse proxy or load balancer. Bastion hosts are often hardened and secured with additional secur
Zero Trust Network Access (ZTNA)
Zero Trust Network Access (ZTNA) refers to a category of products or services combining zero trust architecture with network-level access control to grant access based on identity and certain forms of context . Gartner's definition make it sound similar to Cloud Access Security Brokers and Identity and Access Management tools. Zero trust is a security concept that assumes that no entity, inside or
Secure Access Service Edge (SASE)
SASE stands for Secure Access Service Edge, a concept in network security that refers to the integration of security functions, such as VPN , firewall , and identity management, into a single service. The goal of SASE is to provide secure and flexible access to network resources, both on-premises and in the cloud, for an increasingly remote and mobile workforce. Many SASE vendors will focus on how
Previous Page 3 of 3 Next

Revolutionize
Your Security

Embrace Seamless Resource Access, Robust Zero Trust Integration, and Streamlined Compliance with Our App.

Pomerium logo
© 2024 Pomerium. All rights reserved