Resources Categorized: Zero Trust

There are a total of (31) items.
Context-Aware Proxy
A context-aware proxy is a type of proxy server that uses contextual information about the user, device, and request to make informed access control decisions. This type of proxy server integrates multiple security and network functions, including firewall, VPN , and intrusion detection, into a single, unified platform. The context-aware proxy uses information such as the user's identity, location
Zero Trust
Zero trust is a cybersecurity model that assumes that all users and devices within a network are potential threats, regardless of their location or whether they have been granted access to the network in the past. The goal of zero trust is to prevent data breaches, cyber attacks, and other security incidents by implementing strict access controls that are based on continuous monitoring and authent
Zero Trust Network Access (ZTNA)
Zero Trust Network Access (ZTNA) refers to a category of products or services combining zero trust architecture with network-level access control to grant access based on identity and certain forms of context . Gartner's definition make it sound similar to Cloud Access Security Brokers and Identity and Access Management tools. Zero trust is a security concept that assumes that no entity, inside or
Blog
Children’s Guide to Context-Aware Access
Blog
Children’s Introduction Guide to Zero Trust
Blog
Announcing Pomerium v0.20
Blog
Analyzing the US Government’s Adoption of Zero Trust
Blog
Highlights from IBM’s Cost of a Data Breach 2022
Blog
Announcing Pomerium v0.18
Previous Page 3 of 4 Next

Revolutionize
Your Security

Embrace Seamless Resource Access, Robust Zero Trust Integration, and Streamlined Compliance with Our App.

Pomerium logo
© 2024 Pomerium. All rights reserved