Two puzzle pieces demonstrate integration of VPN and firewalls.

VPN-Firewall Integration: A Strategic Analysis

However, recent critical vulnerabilities in such setups have sparked a debate: Is it still prudent to combine these features on the same device? The Appeal of Integrated VPN-Firewall Solutions Integrating VPN functions within firewalls has been favored for several compelling reasons: The Risks of Consolidation Despite the apparent advantages, there are significant security concerns to … Read more

Navigating Zero Trust – Part 1

Though Zero Trust is here to stay, that doesn’t mean implementation is easy. Rob Maas is one of the leading Zero Trust consultants and the Field CTO at ON2IT. In this blog series, he’ll provide background and tips based on his years of practical experience implementing Zero Trust.

The Log4j lessons: If it ain’t broke, fix it now!

Why did Log4j have such an impact? But, although Log4j and follow-up attack vectors are still a real threat for many organizations, it’s certainly not too early to draw lessons learned from this episode. What made Log4j different from other ‘classic’ 2021 vulnerabilities such as Citrix, Kaseya, and Hafnium (Exchange) is the fact that it … Read more

The broken DMZ model

The DMZ model can be found in the physical world, with the DMZ between North and South Korea being the most well-known. The idea of this DMZ is that it is neutral territory. Whenever there needs to be some sort of discussion impacting both parties, they meet in the DMZ. When network operators first started implementing the DMZ model, the idea was same.

Network segmentation is not Zero Trust

The terms network segmentation and Zero Trust are used more and more and have turned into real buzzwords. We are asked more and more often whether or not we can segment the network. What is actually being asked is, can we help set up a Zero Trust environment.