article thumbnail

10 cloud strategy questions every IT leader must answer

CIO

If you ask someone, they’ll often recite a list of a dozen potential benefits of cloud — lower costs, better security, greater agility, and so on,” says Smith. data, security, development, architecture) as well. How will we balance security, agility, and usability? Cloud Architecture, Cloud Computing, Cloud Management

Strategy 363
article thumbnail

Cathay Pacific to take cloud journey to new heights

CIO

Delivering a zero-trust security posture is an integral part of a SASE architecture and integral to emerging SASE offerings.” SASE is defined by IDC as a combination of network as a service and security as a service into a unified cloud-native architecture, shifting the focus from a traffic-centric to an identity-based methodology.

Airlines 298
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Introducing Cloud NGFW for Azure — On-Prem to Azure, Seamlessly Secure

Palo Alto Networks

Our customers are excited about the cloud for the agility, flexibility and scalability it provides. Our managed firewall service even integrates with Azure Virtual WAN deployments, so customers can protect traffic across their entire networks. Every day this technology blocks nearly 5 billion events, analyzes 3.5

Azure 108
article thumbnail

The 10 most in-demand tech jobs for 2023 — and how to hire for them

CIO

But 86% of technology managers also said that it’s challenging to find skilled professionals in software and applications development, technology process automation, and cloud architecture and operations. Companies will have to be more competitive than ever to land the right talent in these high-demand areas.

LAN 358
article thumbnail

TripleBlind secures $24M for a new approach to enterprise-level, privacy-preserving data sharing

TechCrunch

” TripleBlind still applies encryption to data and algorithms, but its patented approach encryption and the architecture of how data is used mean that the data never leaves its owner when it’s being used in computations. That is the critical point for investors. ”

article thumbnail

Platforms in Action — Three Companies That Supercharged Risk Posture

Palo Alto Networks

Security architecture, built on point products, is complex and lacks the integration needed to stop sophisticated zero-day attacks. The company had always prioritized agility and innovation over data security, but security challenges were rapidly mounting.

Company 89
article thumbnail

Myth #1: Network Security Compliance Is Not All About Rules and Access Control

Firemon

When a firewall has 2,000 lines of code, it can’t be managed on a spreadsheet. Most organizations will attempt to resolve this problem by asking their firewall vendors for administrative tools. Rebuilding firewalls after a disaster is critical, yet often overlooked. The Visibility Problem.