Year: 2023
The Role of Identify Brokers in a SASE Solution
The Role of Identify Brokers in a SASE Solution
In my previous blog on identity-aware SASE I discussed zero trust, the role of SASE, and the importance of identity in access controls. Another blog on SASE Proxy explained how SASE solutions obtain users’ identities after authenticating[...]
Read Post >
Aryaka Presented at Networking Field Day 30
Aryaka Presented at Networking Field Day 30
Ever wondered after doing something for the first time, why you waited so long to do it? I guess we all know that feeling. And so, it goes for us at Aryaka after presenting at Networking Field[...]
Read Post >
The Present And Future Of Enterprise Security
The Present And Future Of Enterprise Security
Without argument, growth or change is inevitable. The enterprise security landscape has evolved significantly over the past few decades, driven by technological advancements and changing security threats. In the past, enterprise security was primarily focused on physical[...]
Read Post >
Reflecting on the Aryaka Accelerate Global Partner Program
Reflecting on the Aryaka Accelerate Global Partner Program
Thank You to My Channel Mentors I spent more than 18 years at Lumen, almost half of my life, and while there, I learned from some great mentors. I learned from them all the fundamentals of creating[...]
Read Post >
Convergence of proxy types for SASE
Convergence of proxy types for SASE
Why Proxies in SASE? Gone are the days when the packet level security was considered sufficient. Due to the sophistication of attacks, it is becoming imperative to do deep content inspection for various kinds of protections. Identity[...]
Read Post >
Aryaka women in tech – Support. Empower.  Grow.
Aryaka women in tech – Support. Empower. Grow.
The International Day of Women in Technology and Science is celebrated every year on the 11th of February to acknowledge the achievements of women in the field of technology and science. This day serves as a reminder[...]
Read Post >
SD-WANswers with ChatGPT <br><h5>“Hey ChatGPT, why do some enterprises still avoid using SD-WAN?”</h5>
SD-WANswers with ChatGPT
“Hey ChatGPT, why do some enterprises still avoid using SD-WAN?”
ChatGPT is incredible.  I mean, it not only has all the answers, it has them in seconds.  How do you compete!?  You don’t.  You leverage it … and have a bit of fun along the way. Real[...]
Read Post >
The Benefits of Converging Network and Security
The Benefits of Converging Network and Security
If you’re following the networking and security space, I’m sure you’ve read a lot about convergence over the past year or so. And, every day you probably have the best example of convergence in your pocket. Your[...]
Read Post >
What is Not SASE?: 5 Common Misconceptions Around SASE
What is Not SASE?: 5 Common Misconceptions Around SASE
SASE (Secure Access Service Edge) is a new approach to network security that integrates multiple security and networking functions into a single cloud-based platform. However, there are many misconceptions around SASE that can prevent businesses from fully[...]
Read Post >
Network Security: Protecting Your Digital Assets
Network Security: Protecting Your Digital Assets
In today’s digital age, data has become one of the most valuable assets for businesses and individuals alike. As we rely more and more on technology to store and transmit sensitive information, the importance of network security[...]
Read Post >
Network Security Best Practices
Network Security Best Practices
In today’s digital world, network security has become a crucial aspect of protecting your business and personal information. Network security involves implementing policies and procedures to prevent unauthorized access, misuse, modification, or destruction of data. In this[...]
Read Post >
Threat Hunting Techniques and Solutions with Unified SASE
Threat Hunting Techniques and Solutions with Unified SASE
What is threat hunting? Threat hunting is a proactive defense approach to detect threats that evade existing security solutions. Why threat hunting? Firewall, IDS/IPS, SWG, ZTNA, CASB functions help in protecting enterprise assets from known threats. Security[...]
Read Post >