Zero Trust Innovators
We offer worldwide managed cybersecurity services for organizations with complex and dynamic IT infrastructures. Our managed services are modular, scalable and cost-effective, and always based on Zero Trust.
Complete visibility and control with 24/7 managed IT security support
Combining policy, architecture and operation. Continuously guarding the quality and effectiveness of your security measures.
The automated platform for the (Managed) Security Operations Center
Data segmentation and protection for public and private cloud environments
What are you looking for?
SaaS security Container security Kubernetes
Endpoint security Ransomware Malware Phishing
Application security SOC SIEM Firewalls
GDPR Security validation Pentest
Zero Trust Security architecture Network segmentation Software-Defined Data Center Security Framework
Partners, organizations & solutions
Palo Alto Networks Traps Cortex XDR WildFire VMware NSX SafeBreach BitSensor LogRhythm Nutanix NeuVector Extreme Networks Cofense Amazon AWS Microsoft Azure
IT security news
News from the IT security landscape
Context is key: the data challenge of cybersecurity
One of the biggest challenges within cybersecurity is how to handle the sheer amount of data. Everyone in the field is familiar with the stories of failed SIEM implementations, because the number of false positives is simply too big for the available IT staff to have enough time and manpower to separate the useful from the useless.
The ‘Special Publication Zero Trust Architecture’ by NIST
Recently, NIST published the Special Publication (NIST SP) for Zero Trust. ON2IT has been implementing Zero Trust based Cybersecurity strategies for over ten years, pushing forward the work of founding father John Kindervag.
The broken DMZ security model
The DMZ (Demilitarized zone) model can be found in the physical world, with the DMZ between North and South Korea being the most well-known. The idea of this DMZ is that it is neutral territory. Whenever there needs to be some sort of discussion impacting both parties, they meet in the DMZ. When network operators first started implementing the DMZ model, the idea was the same.