1671: Ericom - ZTEdge, Zero Trust Cloud Solution for MSEs & SMBs
Tech Talks Daily30 Juli 2021

1671: Ericom - ZTEdge, Zero Trust Cloud Solution for MSEs & SMBs


Ericom Software recently announced the release of ZTEdge, an all-in-one zero trust cloud security platform designed specifically for midsize enterprises, a market underserved yet highly vulnerable to cyberattacks. Ericom's CSO, Chase Cunningham joins me on the Tech Talks Daily Podcast to discusses the market, positioning, and why this product is an industry-first for midsize enterprises.

Large enterprises have accelerated their adoption of zero-trust security in response to the increased levels of cyberattacks experienced during the pandemic. Equally vulnerable, midsized enterprises and small businesses have the same need for zero-trust security protection. Still, existing solutions are too complex, too expensive, and too resource-intensive for many of them to adopt.

ZTEdge provides a solution that is right-sized for the needs of this market. It offers a comprehensive solution that reduces cyber risk, cuts complexity, and improves performance, all at price points dramatically lower than competitive offerings.

We explore the following key areas:

Identifying Users and Authenticating Devices: connects the right people and devices to the right apps and resources by using password-based or passwordless authorization and multi-factor authentication.

Secure Web and Internet Access: protect users as they interact with the web and email by leveraging URL filtering, anti-virus scanning, anti-phishing protection, remote browser isolation (RBI), and more.

Secure Remote Private Application Access: provides a simple way to connect remote workers with private cloud or on-premises applications, using Zero Trust Network Access (ZTNA) capabilities.

SaaS Application Access Control: offers dedicated ZTEdge tenant IP addresses allowing organizations to enforce IP-based access policies to secure apps like Office 365 or Salesforce, thereby eliminating credential theft risks.

Network Protection and Monitoring: segments and monitors networks using machine learning-powered micro-segmentation and granular network traffic analysis – stopping threats from spreading.

User-Branch-Internet Connectivity: integrated SD-WAN capabilities allow an organization to securely connect users and offices and securely route branch traffic directly to the ZTEdge cloud and internet, eliminating the need to backhaul branch traffic over costly MPLS circuits.

Avsnitt(2000)

How Saviynt Is Tackling The Explosion Of Human And Machine Identities

How Saviynt Is Tackling The Explosion Of Human And Machine Identities

How do you secure a modern business when identities no longer belong only to employees, but also to partners, machines, applications, and increasingly AI agents? In this episode of Tech Talks Daily, I...

16 Mars 28min

BlackBerry - A Strategy For Post Quantum Secure Communications

BlackBerry - A Strategy For Post Quantum Secure Communications

How prepared are organizations for a world where today's encrypted communications could be quietly stored and cracked years from now? In this episode of Tech Talks Daily, I sat down with Nate Jenniges...

16 Mars 24min

Inside Ricoh's Research On Workflow Friction And Document Chaos

Inside Ricoh's Research On Workflow Friction And Document Chaos

Why are employees still drowning in administrative work despite years of digital transformation, new software platforms, and constant promises that technology will make work easier? In this episode of...

15 Mars 22min

From NASA Engineer To Drata CEO: Adam Markowitz On Building Trust In The AI Age

From NASA Engineer To Drata CEO: Adam Markowitz On Building Trust In The AI Age

How do you build trust in a business environment where security reviews, compliance demands, and vendor risk checks can slow everything down just when companies are trying to move faster? In this epis...

15 Mars 26min

Natterbox And The Future Of Voice AI In Customer Experience

Natterbox And The Future Of Voice AI In Customer Experience

*]:pointer-events-auto scroll-mt-(--header-height)" dir="auto" tabindex="-1" data-turn-id= "effc95df-294b-4192-9cc6-00e1eb5e3a7e" data-testid= "conversation-turn-1" data-scroll-anchor="false" data-tur...

14 Mars 26min

Pendo CEO Todd Olson On How AI Is Redefining The Product-Led Organization

Pendo CEO Todd Olson On How AI Is Redefining The Product-Led Organization

How do you turn trillions of user interactions into meaningful decisions without drowning in data? In this episode of Tech Talks Daily, I sit down with Todd Olson, co-founder and CEO of Pendo, to talk...

13 Mars 30min

Genesys Agentic Virtual Agent Powered by LAMs for Enterprise CX

Genesys Agentic Virtual Agent Powered by LAMs for Enterprise CX

Have you ever contacted customer support with a simple request, only to find yourself trapped in a loop of scripted chatbot responses that never actually solve the problem? It's an experience many of ...

12 Mars 25min

Inside o9 Solutions And The AI Systems Powering Modern Supply Chains

Inside o9 Solutions And The AI Systems Powering Modern Supply Chains

*]:pointer-events-auto scroll-mt-(--header-height)" dir="auto" tabindex="-1" data-turn-id= "616a78a9-936c-48a2-92f7-e1bbd7029cf6" data-testid= "conversation-turn-1" data-scroll-anchor="false" data-tur...

11 Mars 31min

Populärt inom Politik & nyheter

aftonbladet-krim
svenska-fall
p3-krim
flashback-forever
rss-krimstad
rss-sanning-konsekvens
rss-vad-fan-hande
spar
motiv
aftonbladet-daily
rss-flodet
rss-krimreportrarna
olyckan-inifran
rss-frandfors-horna
rss-aftonbladet-krim
svd-ledarredaktionen
dagens-eko
politiken
blenda-2
krimmagasinet