We're going to KubeCon 2024 in Salt Lake City, Utah from Nov 12-15! If you're going, we'd love to meet you to hear about your Pomerium journey!
Pomerium v0.27
New integration with FleetDM
Recent breaches with $$$ attached
Zero trust architecture enablement with Pomerium JWTs
Decisionmaker's guide to cloud workstations
Pomerium v0.27 is here with performance improvements and bug fixes!
Get excited about:
🛠️ New widget: Report an issue
📁 New policy condition: Exists
🔐 New TLS support for downstream connections
📈 New metrics and visualizations in Zero
💡 Performance and quality of life improvements
Because device management is critical to Zero Trust
Learn how to ensure that only compliant devices are allowed to access sensitive resources when you combine FleetDM with Pomerium. We'll showcase our new integration to support policy enforcement based on device state for FleetDM users, allowing DevSecOps to enforce fine-grained authorization policies at the HTTP layer.
How much can a breach cost today?
We compiled some recent large $$$ in the past months below:
Ransomware rakes in record-breaking $450 million in first half of 2024
Ransomware victims have paid $459,800,000 to cybercriminals in the first half of 2024, setting the stage for a new record this year if ransom payments continue at this level.
23andMe agrees to pay $30 million to settle lawsuit over massive data breach
23andMe will pay $30 million to settle a class action lawsuit over a data breach that affected more than 6.9 million customers.
Health Network Reaches $65M Settlement Over Data Breach
Lehigh Valley Health Network has announced a tentative agreement to pay $65 million to those affected by a data breach last year, following a lawsuit that originally focused on photos of cancer patients.
T-Mobile Will Pay Record-Breaking $60 Million Settlement Over Alleged National Security Violations
T-Mobile will fork over $60 million to settle allegations it failed to disclose and take action against unauthorized access to internal data that occurred after its merger with Sprint in 2020, according to multiple outlets, marking the largest fine ever imposed by the Committee on Foreign Investment in the U.S.
How can upstream services ensure an incoming request is genuine?
When organizations attach Pomerium's JWT to each validated request, they can architect their upstream services and applications to only accept an incoming request if it comes with a Pomerium JWT. This ensures the request has been authenticated and authorized by the policy enforcement point, fulfilling the basic criteria of a zero trust architecture.
Improve productivity and lower costs in one go
Some companies are successfully increasing developer productivity and saving on costs by shifting to remote development environments and workspaces. This guide will examine three common solutions, trade-offs, and how implementing practitioners can bring it into their own organizations.
Want free swag? Drop us a line at media@pomerium.com and let us know how you’re using Pomerium. We love hearing about all the ways our users are securing their infrastructure and accelerating their deployments with Pomerium, and want to share those stories with the Pomerium community.
Have questions or need assistance?
Feel free to reach out on our Discuss forums!
Want to see what other people are saying about Pomerium?
Check out ExtraHop's review here, or read our Customer Stories!
Stay up to date with Pomerium news and announcements.
Embrace Seamless Resource Access, Robust Zero Trust Integration, and Streamlined Compliance with Our App.
Company
Quicklinks
Stay Connected
Stay up to date with Pomerium news and announcements.