![zero trust and ai, how they work together](/assets/img/post/zero-trust-and-ai.png)
Zero Trust and AI
Where AI stands in Zero Trust Security?
Is AI an advantage for Zero Trust Security or a disadvantage?
![ztna vs vpn](/assets/img/post/zero-trust-iot.png)
![remote browser isolation](/assets/img/post/remote-browser-isolation.png)
What is Remote Browser Isolation
What is Remote Desktop Isolation
Do you hesitate to click suspicious links? Don't hesitate, click it in our world.
![splitting web traffic in ztna](/assets/img/post/squid.proxy.png)
Split Web Traffic
How to split your web traffic with our ZTNA solution
We will send some of our client web traffic over our ZTNA to the internet
![quic vpn, udp vpn](/assets/img/post/quic.vpn.png)
A new VPN over QUIC protocol with Rust
QUIC protocol benefits for VPN
A new free open source business VPN for everyone
![zero trust network access explanation](/assets/img/post/cloud-security.png)
What is Zero Trust Network Access?
A new security framework against traditional trusted models.
Difference between VPN and ZTNA
![opensource openvpn alternative](/assets/img/post/openvpn.png)
OpenVPN Alternative
Open source alternative to OpenVPN that is designed with Zero Trust Principles
A new free open source business VPN for everyone
![what is applications network](/assets/img/post/applications-network2.png)
What is Applications Network
Is zero trust network means applications network?
Creating a network of applications, not computers are an interesting solution
![dns log analysis in ztna](/assets/img/post/dns-log-in-zero-trust-network.png)
Dns Log Analysis In A Zero Trust Network
How dns log is different in a zero trust network
What is the difference from a classic network
![ip intelligence in ztna](/assets/img/post/ip-intelligence.png)
Ip Intelligence
What is ip intelligence in zero trust architecture.
It's role and benefits for zero trust access
![micro segmentation in ztna](/assets/img/post/micro-segmentation.png)
Zero Trust Access - Micro-Segmentation
What is micro-segmentation in zero trust access (ZTA)
A real example of zero trust micro-segmentation
![ztna vs vpn](/assets/img/post/ztna-vs-vpn.png)
Zero Trust Network Access (ZTNA) vs VPN
What makes different ZTNA (Zero Trust Network Access) from traditional VPN (Virtual Private Network)
What is the purpose of Zero Trust Network Access
![network OSI model for ztna](/assets/img/post/8-layer-network-osi-model.png)
New Network OSI Model For Zero Trust Security
FerrumGate implements its zero trust networks by adding a new layer to network OSI layer
Adding a new layer, changes so many things for next generation cybersecurity...
![Zero Trust architecture](/assets/img/post/zta.png)
Zero Trust Architecture
Zero Trust is the term for evolving cybersecurity paradigms
Zero Trust assumes there is no implicit trust...
![ztna explanation](/assets/img/post/what-is-zero-trust-network-access.png)
Forget Private Network, DMZ, VLAN, Classic Firewall
A new design for zero trust
FerrumGate implements a Zero Trust Model...