Remove Architecture Remove Blog Remove Security
article thumbnail

Top Architecture Blog Posts of 2023

AWS Disaster Recovery

2023 was a rollercoaster year in tech, and we at the AWS Architecture Blog feel so fortunate to have shared in the excitement. As always, thanks to our readers and to the many talented and hardworking Solutions Architects and other contributors to our blog. Building endless aisle architecture for order processing Check it out!

article thumbnail

Introducing the Pure//Launch Blog

Pure Storage

Introducing the Pure//Launch Blog by Pure Storage Blog The Pure Storage data storage platform is the most innovative in the industry, constantly evolving to meet your data storage needs. This new reference architecture validation provides enterprises with more GPU server choices and de-risks AI initiatives, accelerating time to value.

Capacity 116
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

What to know about zero trust architectures

Citrix

Zero trust architectures have gained rapid adoption by cybersecurity teams recently with the rise of knowledge workers moving to remote or hybrid work models. Related Stories How to implement zero trust security for your network How to create a zero trust network It’s time to stop using consumer browsers for work.

article thumbnail

What is Zero Trust Architecture?

Pure Storage

What is Zero Trust Architecture? Zero trust is not a product, service, or technology; rather it’s a strategy and standard, and one that more enterprises are adopting in place of outdated security approaches. In this article, we’ll discuss what ZTA is, why it’s augmenting traditional perimeter network security, and how to implement it.

article thumbnail

Zero trust architecture benefits for your business

Citrix

But in reality, there’s no telling how or when a malicious actor might … The post Zero trust architecture benefits for your business first appeared on Citrix Blogs. Related Stories Seven principles of the zero trust security model Why should you evolve your multi-factor authentication to adaptive authentication?

article thumbnail

Diving deep into Citrix zero trust architecture

Citrix

In my previous blog post , I discussed some of the observed challenges when implementing a zero trust architecture and how you can use Citrix technology to overcome them. In this post, I’ll dive deeper into the components that make … The post Diving deep into Citrix zero trust architecture first appeared on Citrix Blogs.

article thumbnail

Cybersecurity Awareness Month 2024: Doing Our Part to #SecureOurWorld

Pure Storage

Cybersecurity Awareness Month 2024: Doing Our Part to #SecureOurWorld by Pure Storage Blog The 20th Cybersecurity Awareness Month is upon us, and we’re taking the month to spotlight resources and insights to help you improve cyber resilience and build a culture of security. Reporting phishing and known or suspected security incidents.