Ericom Blog

The Ericom team and guest bloggers share their latest thinking on Zero Trust, SASE and the key cyber issues of the day.

What Businesses (by size) were Targets of Ransomware Q1 2021?

Midsize enterprises (MSEs) are the preferred target for ransomware attacks. How are C-level execs are actively responding and what are their options?

Read More

9 Best Practices Depend on Identity and Access Management

Strong Identity and Access Management (IAM) needs to be at the core of any organization’s cyber-defenses. These 9 security best practices depend on it.

Read More

SASE Architecture: The Evolution of Network Security

One emerging solution architecture that has gained traction to help secure modern distributed organizations is called Secure Access Service Edge (SASE).

Read More

Close the Security-Usability Gap with the Right RBI Solution

This article covers how first generation RBI solutions can't compare with ZTEdge Web Isolation, a proven next-generation Zero Trust solution developed for today's, and tomorrow's, challenges..

Read More

Colonial Pipeline and VPN Vulnerabilities

According to a Bloomberg report, the attack on Colonial Pipeline can be traced to the company's insufficient diligence in following a number of IT best practices related to its remote access solutions.

Read More

MSSPs – Win in the SASE Midsize Enterprise Market with ZTEdge

Midsize enterprises, and the MSSPs that serve them, are typically an afterthought for big enterprise security vendors. Enter ZTEdge - the right solution at half the cost.

Read More

Machine Learning in Identity and Access Management

Take a closer look at how machine learning, a subfield of artificial intelligence, is being deployed in cybersecurity for identity and access management security controls.

Read More

Why Remote Browser Isolation (RBI), Why Now?

Remote browser isolation (RBI) has evolved from a "fringe" technology with rough edges that affected performance and user experience to a new class of RBI product that is ready for prime time.

Read More

Midsize Enterprises Migrate to Cloud-Based Zero Trust Solutions

Adopting a cloud-based Zero Trust security approach is the best way for midsize enterprises to defend their distributed workforces against today’s cyber threats.

Read More