1671: Ericom - ZTEdge, Zero Trust Cloud Solution for MSEs & SMBs
Tech Talks Daily30 Heinä 2021

1671: Ericom - ZTEdge, Zero Trust Cloud Solution for MSEs & SMBs


Ericom Software recently announced the release of ZTEdge, an all-in-one zero trust cloud security platform designed specifically for midsize enterprises, a market underserved yet highly vulnerable to cyberattacks. Ericom's CSO, Chase Cunningham joins me on the Tech Talks Daily Podcast to discusses the market, positioning, and why this product is an industry-first for midsize enterprises.

Large enterprises have accelerated their adoption of zero-trust security in response to the increased levels of cyberattacks experienced during the pandemic. Equally vulnerable, midsized enterprises and small businesses have the same need for zero-trust security protection. Still, existing solutions are too complex, too expensive, and too resource-intensive for many of them to adopt.

ZTEdge provides a solution that is right-sized for the needs of this market. It offers a comprehensive solution that reduces cyber risk, cuts complexity, and improves performance, all at price points dramatically lower than competitive offerings.

We explore the following key areas:

Identifying Users and Authenticating Devices: connects the right people and devices to the right apps and resources by using password-based or passwordless authorization and multi-factor authentication.

Secure Web and Internet Access: protect users as they interact with the web and email by leveraging URL filtering, anti-virus scanning, anti-phishing protection, remote browser isolation (RBI), and more.

Secure Remote Private Application Access: provides a simple way to connect remote workers with private cloud or on-premises applications, using Zero Trust Network Access (ZTNA) capabilities.

SaaS Application Access Control: offers dedicated ZTEdge tenant IP addresses allowing organizations to enforce IP-based access policies to secure apps like Office 365 or Salesforce, thereby eliminating credential theft risks.

Network Protection and Monitoring: segments and monitors networks using machine learning-powered micro-segmentation and granular network traffic analysis – stopping threats from spreading.

User-Branch-Internet Connectivity: integrated SD-WAN capabilities allow an organization to securely connect users and offices and securely route branch traffic directly to the ZTEdge cloud and internet, eliminating the need to backhaul branch traffic over costly MPLS circuits.

Jaksot(2000)

Flexera: Why 2026 Is AI's 'Back to Basics' Moment

Flexera: Why 2026 Is AI's 'Back to Basics' Moment

Why are so many AI projects failing to deliver real business value, despite the hype and investment? In this episode, I sit down with Jay Litkey, SVP of Cloud & FinOps at Flexera, to explore the growi...

9 Huhti 18min

The Lucid Software Playbook For Aligning People, Process, And AI

The Lucid Software Playbook For Aligning People, Process, And AI

How do you bring people together to do better work when everything around them feels increasingly complex, distributed, and uncertain? In today's episode, I sat down with Jessica Guistolise from Lucid...

8 Huhti 31min

EvoluteIQ On Rethinking ROI In The Age Of Enterprise AI

EvoluteIQ On Rethinking ROI In The Age Of Enterprise AI

What happens when the very pricing model meant to speed up AI adoption ends up slowing it down? In this episode of Tech Talks Daily, I sit down with Sameet Gupte, CEO and co-founder of EvoluteIQ, to d...

7 Huhti 40min

Closing The AI Trust Gap In Customer Experience With Cyara

Closing The AI Trust Gap In Customer Experience With Cyara

How many bad customer experiences does it take before someone walks away for good? In my conversation with Amitha Pulijala, we explore why the answer might be fewer than most businesses are prepared f...

6 Huhti 33min

Turning AI Ambition Into Real Business Value

Turning AI Ambition Into Real Business Value

What does it really take to move AI from endless experimentation into something that creates real business value? In this episode, I sat down with Tom Alexander, Head of Innovation and Transformation ...

5 Huhti 30min

Adapting To Rising Costs And Constant Threats

Adapting To Rising Costs And Constant Threats

Is the endpoint still just a device, or has it quietly become one of the most important control points in modern enterprise security? Recording live from IGEL Now And Next in Miami, I sat down once ag...

5 Huhti 18min

The Rise Of Contextual Access And Adaptive Security

The Rise Of Contextual Access And Adaptive Security

What does it really take to move from talking about Zero Trust… to actually making it work in the real world? Recording live from IGEL Now And Next in Miami, I caught up with John Walsh for what has n...

4 Huhti 20min

When Recovery Takes Weeks: The Endpoint Problem With James Millington

When Recovery Takes Weeks: The Endpoint Problem With James Millington

How long would it actually take your organization to recover every endpoint after a major cyber incident? Recording live from IGEL Now And Next in Miami, I sat down with James Millington to explore a ...

3 Huhti 23min

Suosittua kategoriassa Politiikka ja uutiset

uutiscast
aikalisa
politiikan-puskaradio
ootsa-kuullut-tasta-2
rss-ootsa-kuullut-tasta
tervo-halme
rss-vaalirankkurit-podcast
rss-pinnalla
rss-asiastudio
otetaan-yhdet
the-ulkopolitist
et-sa-noin-voi-sanoo-esittaa
rss-podme-livebox
rss-raha-talous-ja-politiikka
rss-kaikki-uusiksi
rss-tasta-on-kyse-ivan-puopolo-verkkouutiset
rss-ulkopoditiikkaa
aihe
rikosmyytit
rss-merja-mahkan-rahat