Meet us at KubeCon in Utah!
Learn about our FleetDM integration
Pomerium v0.27.2 + v0.27.3
Changelogs!
Pomerium vs HashiCorp Boundary
Security is usability - examining cybersecurity erosion
We're going to KubeCon 2024 in Salt Lake City, Utah from Nov 12-15! If you're going, we'd love to meet you to hear about your Pomerium journey!
Integrating MDMs into access control
We recorded our webinar showcasing our new FleetDM integration with Pomerium, ensuring only compliant devices are allowed to access sensitive resources. Thanks to everyone who joined and asked questions! In the meantime, here's a Youtube recording for those who missed it!
Pomerium Zero import tool is here!
For v0.27.2, we fixed some bugs regarding the databroker and a few behavioral issues, then removed several unused configuration options.
The Pomerium Zero import tool exists for those who want to bring an existing Pomerium configuration into Pomerium Zero, our hosted control plane.
The v0.27.3 patch upgrade is for improving Enterprise, and adds the aforementioned FleetDM integration into our External Data Sources feature.
Please review our Core and Enterprise changelogs for more information.
Easier to find and see what changed
We've introduced a new Changelogs page on our main website. This can be found by navigating to the navigation bar for Docs, then clicking Changelog in the drop-down menu.
It's quite fun to see how far we've come over time! The latest one will be our announcement of the v0.27.2 and v0.27.3 double patch!
They're both proxies, so what's the difference?
We're often asked about the differences between Pomerium and Boundary, so we decided to just write a full comparison page! Here is the honest summary:
Boundary’s advantage:
Session recording for HCP Plus and Enterprise Plus
Natural integration with HashiCorp Vault for credential management and credential injection
More options for host discovery with dynamic resource catalogs through integrating with Terraform
Pomerium’s advantage:
Stronger zero trust security with continuous verification
Layer 7 HTTP-based proxy for context-aware access
Clientless access for usability
To understand why HashiCorp Boundary is not a full zero trust solution, read our comparison page below.
When security design causes friction, users will degrade the system over time
Pomerium was designed with clientless access to ensure users don't cause problems over time.
In this blog post, we cover:
Why security is determined by usability
What is cybersecurity erosion and why you should care about it
What design choices mitigate cybersecurity erosion
And some actionable takeaways to evaluate for cybersecurity erosion
Want free swag? Drop us a line at media@pomerium.com and let us know how you’re using Pomerium. We love hearing about all the ways our users are securing their infrastructure and accelerating their deployments with Pomerium, and want to share those stories with the Pomerium community.
Have questions or need assistance?
Feel free to reach out on our Discuss forums!
Want to see what other people are saying about Pomerium?
Check out ExtraHop's review here, or read our Customer Stories!
Stay up to date with Pomerium news and announcements.
Embrace Seamless Resource Access, Robust Zero Trust Integration, and Streamlined Compliance with Our App.
Company
Quicklinks
Stay Connected
Stay up to date with Pomerium news and announcements.