Welcome to…
Aryaka Blog

The Role of Identify Brokers in a SASE Solution

The Role of Identify Brokers in a SASE Solution

Posted on March 15, 2023 By Srini Addepalli

In my previous blog on identity-aware SASE I discussed zero trust, the role of SASE, and the importance of identity in access controls. Another blog on SASE Proxy explained how SASE solutions obtain users’ identities after authenticating[...]
Read Post >
Aryaka Presented at Networking Field Day 30

Aryaka Presented at Networking Field Day 30

Posted on March 7, 2023 By Klaus Schwegler

Ever wondered after doing something for the first time, why you waited so long to do it? I guess we all know that feeling. And so, it goes for us at Aryaka after presenting at Networking Field[...]
Read Post >
The Present And Future Of Enterprise Security

The Present And Future Of Enterprise Security

Posted on February 28, 2023 By Dennis Monner

Without argument, growth or change is inevitable. The enterprise security landscape has evolved significantly over the past few decades, driven by technological advancements and changing security threats. In the past, enterprise security was primarily focused on physical[...]
Read Post >
Reflecting on the Aryaka Accelerate Global Partner Program

Reflecting on the Aryaka Accelerate Global Partner Program

Posted on February 21, 2023 By Craig Patterson

Thank You to My Channel Mentors I spent more than 18 years at Lumen, almost half of my life, and while there, I learned from some great mentors. I learned from them all the fundamentals of creating[...]
Read Post >
Convergence of proxy types for SASE

Convergence of proxy types for SASE

Posted on February 16, 2023 By Srini Addepalli

Why Proxies in SASE? Gone are the days when the packet level security was considered sufficient. Due to the sophistication of attacks, it is becoming imperative to do deep content inspection for various kinds of protections. Identity[...]
Read Post >
Aryaka women in tech – Support. Empower.  Grow.

Aryaka women in tech – Support. Empower. Grow.

Posted on February 9, 2023 By Renuka Nadkarni

The International Day of Women in Technology and Science is celebrated every year on the 11th of February to acknowledge the achievements of women in the field of technology and science. This day serves as a reminder[...]
Read Post >
SD-WANswers with ChatGPT <br><h5>“Hey ChatGPT, why do some enterprises still avoid using SD-WAN?”</h5>

SD-WANswers with ChatGPT

“Hey ChatGPT, why do some enterprises still avoid using SD-WAN?”

Posted on February 7, 2023 By Sean Kaine

ChatGPT is incredible.  I mean, it not only has all the answers, it has them in seconds.  How do you compete!?  You don’t.  You leverage it … and have a bit of fun along the way. Real[...]
Read Post >
The Benefits of Converging Network and Security

The Benefits of Converging Network and Security

Posted on January 31, 2023 By David Ginsburg

If you’re following the networking and security space, I’m sure you’ve read a lot about convergence over the past year or so. And, every day you probably have the best example of convergence in your pocket. Your[...]
Read Post >
What is Not SASE?: 5 Common Misconceptions Around SASE

What is Not SASE?: 5 Common Misconceptions Around SASE

Posted on January 25, 2023 By David Ginsburg

SASE (Secure Access Service Edge) is a new approach to network security that integrates multiple security and networking functions into a single cloud-based platform. However, there are many misconceptions around SASE that can prevent businesses from fully[...]
Read Post >
Network Security: Protecting Your Digital Assets

Network Security: Protecting Your Digital Assets

Posted on January 24, 2023 By David Ginsburg

In today’s digital age, data has become one of the most valuable assets for businesses and individuals alike. As we rely more and more on technology to store and transmit sensitive information, the importance of network security[...]
Read Post >
Network Security Best Practices

Network Security Best Practices

Posted on January 22, 2023 By David Ginsburg

In today’s digital world, network security has become a crucial aspect of protecting your business and personal information. Network security involves implementing policies and procedures to prevent unauthorized access, misuse, modification, or destruction of data. In this[...]
Read Post >
Threat Hunting Techniques and Solutions with Unified SASE

Threat Hunting Techniques and Solutions with Unified SASE

Posted on January 17, 2023 By Srini Addepalli

What is threat hunting? Threat hunting is a proactive defense approach to detect threats that evade existing security solutions. Why threat hunting? Firewall, IDS/IPS, SWG, ZTNA, CASB functions help in protecting enterprise assets from known threats. Security[...]
Read Post >