Millions of people worldwide are still working remotely to support shelter-in-place requirements brought on by the pandemic. For many workers, a remote workstyle is a preference that will likely become a more permanent arrangement. Enterprises have responded by expanding their use of VPNs to provide remote access to the masses, but is this the right choice for long-term access? Aside from enabling easy connectivity, […]
Blog
-
Remote Access: Network Architecture & Security Considerations The global pandemic spurred a massive work-from-home (WFH) wave quite literally overnight. Hundreds of millions of people worldwide were told to stay home to stay safe, but they needed to keep working as best as possible. Enterprises responded to this sudden need for extensive remote network access by focusing on getting people connected—but connectivity often […]
30th May, 2021 -
Cloud Security Basics, Best Practices & Implementation Cloud security is a set of controls, policies, procedures, and technologies that protect data, infrastructure, and systems that are stored in cloud environments. Cloud security measures give businesses the processes and tools they need to keep their data safe, meet their regulatory compliance requirements, protect their customers’ privacy, and establish authentication rules around all of […]
30th May, 2021 -
How to Build IAM with Zero Trust This year, the business community was forced to adapt to a new era of distributed work—and cyber threats have adapted right along with them. Between unsecured home WiFi networks and the rise in personal devices accessing company resources, the opportunities for data theft have risen as teams have dispersed. Implementing robust identity and access management […]
30th May, 2021 -
Once Upon a Framework – An Introduction to SOC 2 SOC2 is today the de-facto standard in security compliance frameworks. Complying with it is an important factor in passing your quarterly and annual financial audits. This is because nowadays security determines, to a great extent, whether or not your business will exist and grow. How did it come to be, and why, exactly, should you […]
30th May, 2021 -
This is the Only SOC 2 Checklist You’ll Ever Need The Only SOC 2 Compliance Checklist You’ll Ever Need Are you chasing an endless trail of screenshots? Awake at 3am, stressed about bugging your stakeholders for evidence–again? Wondering why you decided that this dang compliance framework was worth it? Congrats! You must be preparing for a SOC 2 audit. Soc 2 Compliance Checklist – How to Prepare […]
30th May, 2021 -
Cloud Compliance 101 InfoSec Compliance is a big word, involving most systems in your working environment, and multiple deliverables to be produced for the auditing team. Up till today, this project was as complex as can be. Today, with the introduction of Compliance Automation Platforms, things get simpler. Here’s a list of what you need (and don’t need […]
30th May, 2021 -
Life Is A Checklist of Checklists Daily Chaos, By Design We all know how security compliance works. It’s one of those processes no one dares to disrupt. As InfoSec leaders, after having our morning coffee, we quickly move to our emails, going through those routinely generated reports, which leads us to believe that the procedures and controls are still in place […]
30th May, 2021 -
Startup-Speed Products with Enterprise Grade Compliance Let’s face it – Security compliance is a hassle. (Almost) nobody likes it, it’s boring and perceived as a tedious checklist that must be completed in order to achieve the prestigious mark of being “XYZ” compliant. Why is that, and how can we better tackle this challenge? The Compliance Challenge Companies need compliance mainly for 2 […]
25th May, 2021 -
Automated Workflows – IT & HR Dreams Come True At times when interest rates are close to zero and VC money flows into startups and tech companies, we see a spike in the recruitment pace of talented knowledge workers. The competition for software engineers, developers, DevOps, SREs, and security engineers is fierce. Therefore, companies put lots of effort into optimizing their employee experience, also […]
25th May, 2021 -
Multi Content Delivery Network Explained Your query on the web to find out about CDN, multi CDN, federated CDN, hybrid CDN and why is it important at all, can easily turn into a stream of different, sometimes confusing information, as these terms are getting more and more popular, and definitions are more and more dispersed, given the number of providers […]
21st April, 2021 -
DDoS (Distributed Denial of Service) Explained DDoS Mitigation & Protections services are a crucial part of any internet business strategy. At GlobalDots we analyze, implement and maintain Security for variety of companies, from Fortune 500 to startups and small-to-medium enterprises. Since the topic is broad and many of our customers ask very specific questions, we decided to put together this resource […]
21st April, 2021 -
The 6 Commandments For a Safely Managing Cloud Identities The public cloud has been a great business enabler, but has also created a number of user access relatedblind spots and brought with it serious security challenges. As the number and type of SaaS apps and IaaSservices continues to increase exponentially, user privileges, resource permission sets, app capabilities, andrisks have become increasingly difficult to manage.Authorization, […]
11th April, 2021