Resources

The world of cloud changes quickly. Stay up-to-date with the latest trends & innovation, all explored in our resource library.

Explore our full library

slider item
Zero Trust Access Management
Manuel Reischl, Head of Customer IT Support @ GlobalDots 20.04.22

We were recently approached by the press to provide some policy guidelines for companies adopting the hybrid or 100%-remote model. Truth be told, GlobalDots’ legacy of remote work dates back to the surge of Skype. Yes, we’ve been working remotely for quite a while, so for us, the Pandemic didn’t change much. It is this […]

Read more
How to Keep Hackers Out of Your Distributed Environment
Zero Trust Access Management
Manuel Reischl, Head of Customer IT Support @ GlobalDots 19.12.21

New normal, new challenges One of the outcomes of COVID-19 has been our newfound openness to remote work. According to a recent PwC survey, 41% of workers would now prefer their workdays to be fully remote, compared with 29% in January 2021, signaling the desire to work remotely is only ramping up. For cybersecurity teams, this new reality brings […]

Read more
slider item
Zero Trust Access Management
Admin Globaldots 31.05.21

“Working from home 2021″ marks a massive shift away from common workspaces in response to the global pandemic. There is no more working remotely or working from home, there is just working. The axiom, “work is what you do, not where you go” has never before been so true. The possibility for the workforce to be location independent […]

Read more
slider item
Zero Trust Access Management
Admin Globaldots

On 14 July, 2020, Oliver Hough, a security researcher from Cyjax, published a report centered on a phishing campaign targeting banking customers in the United Kingdom, which evades two-factor authentication (2FA). On 16 December, 2020, researchers from the Global Threat Intelligence Team at WMC disclosed that they were tracking a threat actor who goes by the alias “Kr3pto”. […]

Read more
slider item
Zero Trust Access Management
Admin Globaldots

Overview Phishing continues to be a major attack vector, and it’s surprising just how many security incidents and breaches start with an employee clicking on a link in a carefully crafted phishing email (and sometimes doing the same with a not-so-well crafted phishing email — see this example).  There’s still a general perception that phishing attacks […]

Read more
slider item
Zero Trust Access Management
Admin Globaldots 30.05.21

Millions of people worldwide are still working remotely to support shelter-in-place requirements brought on by the pandemic. For many workers, a remote workstyle is a preference that will likely become a more permanent arrangement. Enterprises have responded by expanding their use of VPNs to provide remote access to the masses, but is this the right choice for long-term access?  Aside from enabling easy connectivity, […]

Read more
slider item
Zero Trust Access Management
Admin Globaldots

The global pandemic spurred a massive work-from-home (WFH) wave quite literally overnight. Hundreds of millions of people worldwide were told to stay home to stay safe, but they needed to keep working as best as possible. Enterprises responded to this sudden need for extensive remote network access by focusing on getting people connected—but connectivity often […]

Read more
slider item
Zero Trust Access Management
Admin Globaldots

Cloud security is a set of controls, policies, procedures, and technologies that protect data, infrastructure, and systems that are stored in cloud environments.  Cloud security measures give businesses the processes and tools they need to keep their data safe, meet their regulatory compliance requirements, protect their customers’ privacy, and establish authentication rules around all of […]

Read more
slider item
Zero Trust Access Management
Francesco Altomare, Senior Sales Engineer @ GlobalDots

This year, the business community was forced to adapt to a new era of distributed work—and cyber threats have adapted right along with them. Between unsecured home WiFi networks and the rise in personal devices accessing company resources, the opportunities for data theft have risen as teams have dispersed. Implementing robust identity and access management […]

Read more
Solution Brief: Passwordless Authentication
Zero Trust Access Management
Admin Globaldots 13.04.21

Part with unsecure password lists, password management and forgotten passwords. Passwordless authentication allows easy access to all business apps with a single tap on your chosen device. This solution brief includes top features, capabilities, and benefits. Fill out the form to get your copy.

Read more
Forrester Wave Zero Trust Report Names GlobalDots Partners “Leaders”
Zero Trust Access Management
Dror Arie, Senior Solutions Architect @ GlobalDots 11.04.21

“As legacy technology becomes outdated and less effective, improved technical capabilities powering the future of work will dictate which providers will lead the pack. Vendors that can provide a secure remote workforce, Zero Trustmission completion, and easy-to-use technology position themselves to successfully deliver true Zero Trust to their customers. ZT is not just about firewalls […]

Read more
Ebook: The 6 Business and Security Benefits of Zero Trust
Zero Trust Access Management
Dror Arie, Senior Solutions Architect @ GlobalDots 08.04.21

Businesses today operate much differently than they did just a few short years ago. Employees, devices,even applications are no longer locked away inside of the corporate perimeter. They’re on the web andon the go. Providing security for a new breed of anytime, anywhere workers and cloud-based applicationsrequires a novel approach. Organizations are increasingly turning away […]

Read more
3 Simple Ways to Start Implementing Zero Trust Security Today
Zero Trust Access Management
Dror Arie, Senior Solutions Architect @ GlobalDots

New business initiatives and processes broaden your organization’s attack surface. Applications, users, and devices are moving outside of the traditional corporate zone of control, dissolving what was once the trusted perimeter, and enterprise security and networks must evolve to protect the business. Taking on a complete Zero Trust security transformation isn’t something that most organizations […]

Read more
Unlock Your Cloud Potential
Schedule a call with our experts. Discover new technology and get recommendations to improve your performance.
Contact us