Vidder
Vidder
Blog Post
  • Let’s face it. The current security stack of firewalls amalgamated with a dozen other security products has been rendered irrelevant by advanced cyberthreats, from predatory malware to credential theft and man-in-the-middle attacks. And with certainty we can predict more attacks (and larger attacks) into increasingly sensitive apps and databases.

Vidder
Vidder
Blog Post
  • Here’s Why It Matters In a “tip of the hat” to how polluted devices and networks have become, VMware and Verizon announced new service offerings to protect applications from cyber attacks.  VMware announced App Defense at VMworld a few weeks ago. Vidder announced yesterday that its technology is being integrated into a new Verizon Software Defined Perimeter managed service for pro...

Vidder
Vidder
Blog Post
  • On my personal blog I wrote about the recent AWS VMware partnership and how it threatens traditional IT vendors, practices and roles. The week before I talked about exploding security processes eroding protection at a Fortune 100 leader, based on a recent interview with a security architect.

Vidder
Vidder
Blog Post
  • Last month I spoke with a security architect at a Fortune 100 enterprise serving a network of hundreds of thousands of company and partner employees in almost 200 countries. Talk about a networking and security challenge. His comments inspired a blog about security process creep and the exponential increase in demands on security teams experiencing even incremental growth.

Vidder
Vidder
Blog Post
  • Security breaches are now a fact of life for almost all organizations.  New attacks don’t respect traditional boundaries and perimeters, from a country’s borders to enterprise firewalls and intrusion prevention systems. This means that the definition of national security within a cyber context is limited to government institutions, not organizations with operations within a nation’s bo...

Vidder
Vidder
Blog Post
  • Today breaches are simply a fact of life in the cyber age. A report tracking the largest breaches of 2017 also said breaches in 2016 had increased by 40% (over 2015 - including the Yahoo compromise of more than one billion accounts) and that 2017 “could get even more messy and more serious.”

Vidder
Vidder
Blog Post
  • New Trust Assessment Overview Video: 6-minute introduction on Vidder’s new trust assessment capabilities and why they are the last nail in the hacker’s coffin.

Vidder
Vidder
Blog Post
  • Currently information solutions for First Responders are built using customized, highly complex and costly communications and application systems. While the adoption of mobile devices and public clouds have become the norm for enterprises these have been considered too risky for emergency services. Until now. 

Vidder
Vidder
Blog Post
  • The Season 7 trailer of Game of Thrones came out today and fans were excited to see that’s going to be bloody war. While Thrones is a fantasy show its strength comes from being a metaphor for real world conflicts.

Vidder
Vidder
Blog Post
  • In the past five months there have been two cyber attacks that combined age-old email phishing with lateral movement to greatly increase their lethality. In February of this year the Saudi Arabian government was hit with a phishing attack that installed a program to delete data.  The attackers were able to increase the blast radius of the attack by using a stolen domain credentials to ...

Vidder
Vidder
Blog Post
  • In response to questions regarding Vidder’s Precision Access™ Trusted Access Control solution and how it compares to traditional Network Access Control (NAC) solutions we’ve created an infographic. The column on the right highlights the time to value impacts of replacing NAC with Trusted Access Control based on each row of characteristics.

Vidder
Vidder
Blog Post
  • Last week Amazon announced another stellar quarter, with AWS again being the main headliner for the ecommerce high flyer. Yet I’m convinced AWS growth and profitability has even deeper implications for traditional hardware-bound network security vendors. Two weeks ago, I spoke with a CISO  at forward-thinking IT shop. It was one of the most encouraging and thought-provoking IT discussi...

Vidder
Vidder
Blog Post
Vidder
Vidder
Blog Post
  • The question that many IT security pros and pundits are asking is: Why hasn’t network access control (NAC) lived up to its promise? I certainly did. And what I discovered helped me to make a career move.

Vidder
Vidder
Blog Post

New blog articles detected.

  • SDP Is The New NAC

    Network World recently published an article on why Software Defined Perimeter (SDP) will replace network access control (NAC) products.  To understand why this makes sense it’s useful to look at the changes happening in the enterprise today.

  • A Flicker Of Light: A New Security Stack Points The Path To Safety

    The last few years have been a difficult time for those who protect data. Defense-in-depth, the gold standard in cyber security, has failed. The basis behind defense-in-depth is to deploy redundant layers of security products to defeat every part the cyber kill chain. Unfortunately inside attacks and compromised devices belonging to authorized users operate within the protective bubble...

Vidder
Vidder
Blog Post

Out-Market Your Competitors?

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account Log in

By signing up, you agree to the Terms of Service and Privacy Policy.

Out-Market Your Competitors

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account

Already a user?  Log in

By signing up, you agree to the Terms of Service and Privacy Policy.