home About Us Podcast Episode 26

The Critical Lowdown Podcast Episode 26

From Traditional Security to Zero Trust: A New Era of Cybersecurity


Incase you missed Part 1: Unpacking the Challenges of Network Security in IT and OT Environments, you can listen here or read the article.

In Part 2 of our two part series on the challenges of network security in IT and OT environments, Chris Bihary, CEO of Garland Technology along John Lynch, Director of Sales for EMEA for EPS Global, speak about the concept of a Zero Trust Framework, as well as the strategies for securing the entire network.

Subscribe to The Critical Lowdown from EPS Global wherever you get your podcasts:

Apple
Spotify
Google
ximalaya
Chris Bihary

Chris Bihary
CEO and Co-Founder, Garland Technology

Chris Bihary, CEO and Co-founder of Garland Technology, has been in the network performance industry for over 20 years. Bihary has established collaborative partnerships with technology companies to complement product performance and security through the integration of network TAP visibility.

 

John K Lynch

John Lynch
Director Sales, EMEA, EPS Global

John Lynch is the Director of Sales for EMEA Networking for EPS Global. He serves on its Board of Directors and been with the Company since its inception in 1999. John has managed the growth of the EMEA Networking business over the last 15 years. Prior to joining EPS, John worked in a technical role for IBM supporting their Spanish market out of their Dublin office. John has a BA in Politics and Spanish from University College Dublin and a Diploma in Financial Management from the Dublin Business School.

If you have any questions about or need advice or tech support for your upcoming project, don’t hesitate to get in touch. Or check out our Service Provider Solutions here.


Glossary of Terms

  • Network TAPs: Hardware tools that allow you to access and monitor your network traffic by copying data packets and sending them to monitoring devices for analysis.
  • OT Environment: Stands for Operational Technology environment. It refers to the hardware and software used to change, monitor or control physical devices, processes, and events in the enterprise.
  • IT Environment: Refers to the composite of hardware, software, network resources, and services required for the existence, operation, and management of an enterprise IT infrastructure.
  • Cybersecurity: The practice of protecting systems, networks, and programs from digital attacks.
  • Packet: A small amount of data sent over a network, such as a LAN or the Internet. Similar to a real-life package, each packet includes a source and destination as well as the content (or data) being transferred.
  • Network Interface Card: A hardware component that connects a computer to a network.
  • Zero Trust Frameworks: A security concept centered on the belief that organizations should not automatically trust anything inside or outside its perimeters and instead must verify anything and everything trying to connect to its systems before granting access.
  • Inline Blocking Devices: Security devices that are placed directly in the flow of network traffic and have the ability to stop, divert or alter traffic.
  • Out-of-band Devices: Security devices that operate separately from the main network data path and are used for network management and security tasks.
  • Bypass TAP: A network TAP that can redirect network traffic in the event of a device failure, ensuring network availability even during device maintenance or downtime.
  • Wiretapping Technology: A method of monitoring and recording communication passing over a network, often used for security and surveillance purposes.
  • Data Diodes: A network appliance or device that allows data to travel in only one direction, used in guaranteeing the flow of information in one direction only, ensuring network segment isolation.
  • Aggregators: Devices that combine several network connections into a single channel, increasing bandwidth and redundancy.
  • Intrusion Prevention Systems (IPS): Network security appliances that monitor network and/or system activities for malicious activity and can prevent or block such activities.
  • Denial of Service (DDoS) Solution: A security solution designed to protect networks or servers from denial-of-service (DoS) or distributed denial-of-service (DDoS) attacks, where the servers are overloaded with requests, causing them to slow down or crash.
  • Network Detection Response (NDR): A security solution that uses artificial intelligence (AI) to detect and respond to threats across the network.
  • Firewall: A network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies.
  • Network Uptime: The time during which a network is operational and available to users.
  • Packet-level Data: Detailed information about each individual packet that travels over a network, including its source, destination, and the data it contains.
  • Managed Service Providers (MSPs): Companies that remotely manage a customer's IT infrastructure and/or end-user systems, typically on a proactive basis and under a subscription model.

 

Need Help?

We have local language and currency support in each of our 28 locations, ensuring you always have access to friendly customer support to deliver your hardware solutions regardless of your location.