Why Traditional High Availability (HA) for Security Devices is Not Enough It’s funny although sometimes the first way we do something might be the right way, we try to improve it Daniel Lakier |October 11, 2017
Single Sign-On (SSO) for Cloud and On Premise Apps If you have signed into Gmail and noticed that you were also able to access Google portfolio apps such as Prakash Sinha |October 10, 2017
Financial Institutions Must Protect the Data Like They Protect the Money If you are like most people and myself, you do not go into a bank and have a conversation with Frank Yue |September 27, 2017
Securing Applications: Why ECC and PFS Matter Many of us are familiar with Secure Hypertext Transfer Protocol (HTTPS) that uses a cryptographic protocol commonly referred to as Prakash Sinha |September 26, 2017
5 Key Items for the Digital Transformation of Healthcare People’s lives are at risk as the healthcare industry transforms patient care with modern IT technologies. Data security and application Frank Yue |September 20, 2017
Are You Migrating Applications to the Cloud? According to a recent report from IDC, by 2020, almost half of IT infrastructure spend will be on cloud IT Prakash Sinha |August 31, 2017
SSL Attacks - When Hackers Use Security Against You In World War II, the Allies had a significant advantage because they were able to compromise the encryption protocols that Frank Yue |August 29, 2017
Outbound SSL Solutions Protect Assets in the Wild Businesses need to protect their assets when they are within their protective infrastructure AND when they are actively exposed or Frank Yue |August 22, 2017
The ADC Key Master Delegates Application Security Functions One of the responsibilities of the Key Master is to provide access to the sensitive and secure information hidden within Frank Yue |August 03, 2017
Secure Application Delivery for Service Providers: Considerations Just as cloud computing means different things to different people, so does the term Service Provider (SP). For the purpose Prakash Sinha |August 02, 2017
The ADC is the Key Master for All Things SSL/TLS In the movies (and real life) one often needs to go through the Key Master to get to the destination. Frank Yue |July 25, 2017
Agile, DevOps and Load Balancers: Evolution of Network Operations Many organizations have a guidance to cut IT spending while rolling out secure application services in a continuous delivery model. Prakash Sinha |July 18, 2017