Browse by topic
Subscribe to our news

Knowledge Base

A Guide to the NIST Zero Trust Architecture

This article is part of our series on Zero Trust. For more information on Zero Trust, check out Zero Trust, Explained. Have you been searching for a more formal definition of Zero Trust? Look no further, NIST has you covered with Special Publication ...
Read

Knowledge Base

What is an Application Network?

This article is part of our series on Zero Trust. For more information on Zero Trust, check out Zero Trust, Explained. Modern enterprise applications run in an increasingly complex environment. Applications and data have increasingly moved beyond ...
Read

Knowledge Base

What is a Zero Trust DMZ for OT?

This article is part of our series on Zero Trust. For more information on Zero Trust, check out Zero Trust, Explained. What is a network DMZ? A demilitarized zone, or "DMZ", is one of the workhorses of network security architecture. A DMZ refers to ...
Read

Knowledge Base

Authentication and Authorization for Zero Trust

This article is part of our series on Zero Trust. For more information on Zero Trust, check out Zero Trust, Explained. Zero Trust security is a powerful paradigm that can help protect resources against malicious attacks, even if the attacker has ...
Read

Knowledge Base

Zero Trust Explained: A Comprehensive Guide

Zero Trust isn't just a buzzword; it is easily one of the most transformative paradigms in cybersecurity - ever. That's not hyperbole. There's a good reason all US Federal agencies are rapidly adopting Zero Trust. But Zero Trust doesn't just apply ...
Read

Knowledge Base

SASE Overlay: An Intro

You may have heard of Secure Access Service Edge, or SASE – but CoIP Access Platform uses a SASE overlay. What is a SASE overlay, and makes the CoIP SASE Overlay different?
Read

Knowledge Base

What is SASE?

This article is part of our series on Zero Trust. For more information on Zero Trust, check out Zero Trust, Explained. In this article, we'll unpack the mystery around SASE - what it is, what's exciting about it, and, importantly, the challenges it ...
Read

Knowledge Base

Micro-Segmentation - North-South, East-West?

This article is part of our series on Zero Trust. For more information on Zero Trust, check out Zero Trust, Explained. North-South and East-West Micro-segmentation is one of the core functions of a next-generation Zero Trust cybersecurity solution, ...
Read

Knowledge Base

Zero Trust in Practice

Never Trust... Always Verify... Now What? If you've been anywhere near cybersecurity in the last few months, you've probably heard the phrase "never trust, always verify" a few times – it's the core tenet of the Zero Trust movement. The concept ...
Read

Knowledge Base

Micro-Segmentation Deployment Models

The Three Basic Micro-Segmentation Deployment Models Micro-segmentation is a powerful strategy for reducing the cyber-risk associated with critical assets and resources. For an introduction to micro-segmentation, see our resource page, ...
Read

Stay Connected

Sign up for our newsletter and to be notified of product, solution, and company news.