<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=2092100&amp;fmt=gif">
    Browse by topic
    Subscribe to our news

    Knowledge Base

    A Guide to the NIST Zero Trust Architecture

    This article is part of our series on Zero Trust. For more information on Zero Trust, check out Zero Trust, Explained. Have you been searching for a more formal definition of Zero Trust? Look no further, NIST has you covered with Special Publication ...
    Read

    Knowledge Base

    What is an Application Network?

    This article is part of our series on Zero Trust. For more information on Zero Trust, check out Zero Trust, Explained. Modern enterprise applications run in an increasingly complex environment. Applications and data have increasingly moved beyond ...
    Read

    Knowledge Base

    What is a Zero Trust DMZ for OT?

    This article is part of our series on Zero Trust. For more information on Zero Trust, check out Zero Trust, Explained. What is a network DMZ? A demilitarized zone, or "DMZ", is one of the workhorses of network security architecture. A DMZ refers to ...
    Read

    Knowledge Base

    Authentication and Authorization for Zero Trust

    This article is part of our series on Zero Trust. For more information on Zero Trust, check out Zero Trust, Explained. Zero Trust security is a powerful paradigm that can help protect resources against malicious attacks, even if the attacker has ...
    Read

    Knowledge Base

    Zero Trust Explained: A Comprehensive Guide

    One concept is gradually gaining traction across the web, government, and the corporate world: “Zero Trust.” However, unlike other buzzwords, this one has the potential to be one of the most transformative paradigms in cybersecurity—so much so that ...
    Read

    Knowledge Base

    SASE Overlay: An Intro

    You may have heard of Secure Access Service Edge, or SASE – but CoIP Access Platform uses a SASE overlay. What is a SASE overlay, and makes the CoIP SASE Overlay different?
    Read

    Knowledge Base

    What is SASE?

    This article is part of our series on Zero Trust. For more information on Zero Trust, check out Zero Trust, Explained. In this article, we'll unpack the mystery around SASE - what it is, what's exciting about it, and, importantly, the challenges it ...
    Read

    Knowledge Base

    Mastering Micro-Segmentation: North-South vs. East-West Strategies

    This article is part of our series on Zero Trust. For more information on Zero Trust, check out Zero Trust, Explained. North-South and East-West Micro-segmentation is one of the core functions of a next-generation Zero Trust cybersecurity solution, ...
    Read

    Knowledge Base

    Zero Trust in Practice

    Never Trust... Always Verify... Now What? If you've been anywhere near cybersecurity in the last few months, you've probably heard the phrase "never trust, always verify" a few times – it's the core tenet of the Zero Trust movement. The concept ...
    Read

    Knowledge Base

    Micro-Segmentation Deployment Models

    The Three Basic Micro-Segmentation Zero Trust Deployment Models Micro-segmentation is a powerful strategy for reducing the cyber-risk associated with critical assets and resources. For an introduction to micro-segmentation, see our resource page, ...
    Read

    Stay Connected

    Sign up for our newsletter and to be notified of product, solution, and company news.