Illuminating the path to zero trust security

Zentry Blog

Woman with projected code.

What Is a Software Defined Perimeter (SDP)?

Here at Zentry, we often get asked “What is a Software Defined Perimeter?”  And that’s usually followed by “What’s the difference between SDP and Zero Trust Network Access (ZTNA)?”  The answer is somewhat subtle, but both are primarily concerned with

READ MORE
Graphic representation of data transfer.

What Is Zero Trust Security?

Whether “zero trust security”, “zero trust framework”, “zero trust network” or “zero trust security model”, the fundamentals are the same: The network is assumed to be hostile Threats, both internal and external, are assumed to exist on the network The

READ MORE

What Is SASE & Why Should Your Company Adopt It?

What Is SASE? The SASE architecture, or Secure Access Service Edge, combines wide-area networking (WAN) and network security technologies like CASB (cloud access security broker), FWaaS (firewall as-a-service), and ZTNA (zero trust network access) into a cloud-delivered service model.  In

READ MORE
Zentry Security How to Implement Zero Trust

How To Implement Zero Trust

Zero Trust is a network security model that trusts no one, regardless of their location.  Increasingly, trust can no longer be established based on whether a user is “inside” or “outside” the network. In a Zero Trust model, every user

READ MORE

Behind the Zentry Name

We often get asked by customers about our name.  It is unique but it’s also intentional. It’s a mashup of two words: Zen, as in the feeling of being peaceful and relaxed Sentry, a guard to prevent unauthorized entry of

READ MORE
HIPAA Compliance

Meeting Compliance Goals with ZTNA

How Zero Trust Network Access can “help with HIPAA” Regulatory compliance standards, such as HIPAA or PCI DSS, whether specified by industry or mandated by the government, affect all industries. For example, financial organizations in the U.S. are required to

READ MORE
Take the easy street to secure remote access

Making the Shift From a Traditional VPN to ZTNA

Why should you start to shift from a traditional VPN to ZTNA as your secure access solution? First of all, you may ask yourself, why should I make this shift? VPNs have always been the way we provide remote access to our network, servers, and applications…

READ MORE
Zero Trust Security - a small history peek

ZTNA: Zero Trust Security for the Wild Wild Web

2021 marks the 25th anniversary of the virtual private network or VPN. One of the most prevalent technology solutions used to provide a private connection between an end-user and the applications or resources they need access to, VPNs have served

READ MORE
Virtual Private Network (VPN) Remote Work

Thank You, VPN – But Times Have Changed

It’s time to scrap the VPN for secure remote access Later this year, after we’ve all been vaccinated against COVID-19, it will be relatively safe to return to the office. But many of us won’t, at least not full-time. A

READ MORE
Securing remote access with a Zen-like approach

A New Era in Secure Remote Access

Improved Workforce Productivity, Enhanced Enterprise Security with Less Effort and more OMMM Let’s face it – cyber threats don’t discriminate. They threaten everyone and every type of organization, from big governments (anyone heard about the SolarWinds supply-chain attack?) to individuals

READ MORE

SUBSCRIBE TO OUR BLOG

Stay informed about Zero Trust Network Access

LET’S Get Started

Learn how to Zentrify your Applications