When you’re working towards a Zero-Trust model, you can’t afford to ignore legacy systems. Here are the questions you should be asking, and the best practices for ensuring legacy technology is part of your strategy from the start.
About Sharon Besser
Sharon is VP of Business Development for Guardicore. Prior to this, he was VP Products, responsible for driving product strategy for the company. He is an accomplished data and network security expert with successful track record combining deep technical hands-on excellence with market vision to incubate new solutions and develop next generation technologies. Prior to Guardicore Sharon was the co-founder of Publicom (acquired by Comsec), co-founder of EyeOTee Inc., VP Technologies at Net Optics (acquired by IXIA), VP of products strategy at Imperva, Director of security solutions at Check Point, and Director of security products at Websense. Sharon holds a BSc degree in Computer Science, Mathematics and Geography from Bar Ilan University.
Entries by Sharon Besser
The misuse of privileged accounts is one of the highest risks for today’s enterprises. Our deepened integration with privileged access security solution, CyberArk makes it easier to protect against this threat. Read how.
Outposts is a game-changer for businesses looking to benefit from cloud technology on premises for a consistent hybrid experience and tighter control over data. Guardicore now visualizes and protects this valuable extension of the AWS cloud. Here’s how it works.
Microsoft has awarded Guardicore IP Co-Sell Status, recognizing that it is a trusted partner for customers looking to achieve a wide range of cloud security goals. Let’s look at Guardicore’s integration on the Azure marketplace. Read more to see how this impacts you.
While some information is not available, understanding how the Capital One data breach happened can support your enterprise in protecting its cloud instances, and developing a security posture that offers visibility and control in a hybrid environment. Using Guardicore’s expertise as an Advanced Technology Partner for AWS with security competency, we believe that Centra, our flagship solution, has the right built-in tools to augment and support native-cloud controls exactly where they might fail.
According to Forrester, Zero Trust is a must-have in today’s evolving threat landscape. Automation, tight policy, secure access and least privilege are some of Guardicore’s best practices to make a success of this model. But how can you bring it all together?
Whether you’ve transitioned to the cloud, are still using on-prem servers, or are operating on a hybrid system, you need security services that are up to the task of protecting all your assets. Naturally, you want the best protection for your business assets. In the cybersecurity world, it’s generally agreed that micro-segmentation is the foundation […]
We help customers segment and micro-segment their clouds and data centers quickly. When we identified several steps that can be accelerated with more sophisticated code, we used data collected from our customers and studied by Guardicore Labs and added machine learning capabilities to accelerate micro-segmentation.
Gartner describe four models of micro-segmentation, but only Overlay addresses a future-focused ecosystem by supporting multiple cloud vendors, best-in-class flexibility and strong risk-reduction tools for dynamic enterprises.
It’s been 18 months since June 2017 when the Petya/NotPetya cyber attacks fell on businesses around the globe, resulting in a dramatic loss of income and intense business disruption. Has cyber insurance limited the fallout for the victims of the ransomware attacks, and should proactive businesses follow suit and ensure they are financially covered in […]