Blog

blog feed
Instant deployment for Jamf Intune

Managing Zenarmor at Scale with Microsoft Intune and Jamf

Managing security across a distributed workforce is a constant challenge. With employees using a mix of macOS and Windows devices from various locations, IT teams need a reliable way to ensure every endpoint is protected and updated without relying on manual installs or user action.

Zenarmor Marketing TeamZenarmor Marketing Team
Restore Visibility in Distributed Networks

Regaining Control: How to Restore Visibility in Hyper-Distributed Networks

Everyone knows enterprise traffic is no longer confined to data centers or VPN tunnels.

Zenarmor Marketing TeamZenarmor Marketing Team
Zenarmor Home Devices Policies

What’s New in Zenarmor Home: More Devices, More Policies

What’s New in Zenarmor Home: More Devices, More Policies Zenarmor SASE 2.0 is here and it marks a turning point in how we protect networks across the globe.

Zenarmor Marketing TeamZenarmor Marketing Team
Zenarmor SASE Walkthrough

A Walkthrough of Zenarmor SASE 2.0

Secure Access Service Edge, or SASE (pronounced “sassy”) was coined by the research firm Gartner in 2019 to describe a set of solutions to better protect the modern workforce. User traffic patterns shifted from occasional internet usage to being reliant on it for connectivity to the cloud and Software as a Service (SaaS) applications like Microsoft Office 365, Salesforce, Slack, and more.

Zenarmor Marketing TeamZenarmor Marketing Team
SASE Practices

Plug and Secure Anywhere: Rethinking SASE for the Real World

If you ask any IT leader today what keeps them up at night, chances are their answer is not just security. It is security at scale. As businesses strive to keep up with hybrid work, legacy technologies and remote teams, the traditional boundaries of the network have almost disappeared.

Zenarmor Marketing TeamZenarmor Marketing Team
Legacy SASE

Beyond the Buzzword: Why Traditional SASE Falls Short and Zenarmor Excels

Over the past few years, a large number of tools and technologies have emerged that promise to ‘revolutionize network security’. The modern hybrid work landscape has brought Secure Access Service Edge (SASE) into the conversation too.

Zenarmor Marketing TeamZenarmor Marketing Team
VPN Alternatives for Cybersecurity

Traditional VPNs are Slowing you Down - And Leaving you Exposed. Here’s a Better Alternative.

Let’s face it - the way most companies handle secure access now, doesn’t cut it any more. Old school VPNs were dependable at a time when everyone worked from the office, and cloud applications weren’t a thing.

Zenarmor Marketing TeamZenarmor Marketing Team
Zenarmor Sase 2.0

Zenarmor SASE 2.0 is Here: Plug & Secure Anywhere for the Modern Workforce

Today is an important day for us here at Zenarmor.

Murat BalabanMurat Balaban
Zenarmor MSP MSSP

Why Zenarmor 1.18 is a Game-Changer in Boosting Revenue for MSPs and MSSPs

Endpoint devices like laptops and desktops often operate beyond the traditional security perimeter, exposing organizations to increased risks. Employees frequently connect to unsecured public WiFi networks. While VPNs are usually deployed to mitigate this, they come with limitations, including performance bottlenecks, poor user experiences, and the risk of being entirely bypassed. These gaps leave businesses vulnerable, creating a growing demand for more effective, seamless security solutions.

Lyal SaaymanLyal Saayman
Zenarmor 1.18 is here, ready to secure your distributed, remote workforce

Zenarmor 1.18 is here, ready to secure your distributed, remote workforce

Zenarmor 1.18 has arrived, and it is one of the most feature-packed releases yet! In this release, we are one step closer to achieving our goal of delivering a truly remarkable Secure Access Service Edge (SASE) product to help address the security concerns of an ever-expanding hyper-distributed, remote workforce making use of our industry-first Plug & Secure Anywhere approach to network security.

Lyal SaaymanLyal Saayman
SASE Challanges

Why conventional Secure Access Service Edge Solutions (SASE) are not so sassy after all

You’ve been working from home for a few years now, enjoying the flexibility and comfort it offers. But imagine this: your manager announces that the company is shifting back to a pre-COVID working style, meaning you’ll need to return to the office. Who would be happy about this change? Surprisingly, among the few colleagues who might welcome the idea, the security team stands out.

Murat BalabanMurat Balaban
Zenarmor 1.17 TLS Inspection Statement

Zenarmor 1.17 TLS Inspection Statement

We have noticed some chatter about our latest release of Zenarmor 1.17 across various social channels. While it has been received well by the large majority of our customers, we have noted some concerns or confusion about our newly added Security Service Edge (SSE) subscription as well as the Full TLS Inspection capabilities made available in this release. We would like to take the opportunity to provide some clarity about this and our future roadmap.

Zenarmor Marketing TeamZenarmor Marketing Team
Clarifying the Road Ahead: Zenarmor's Strategic Vision and Product Roadmap

Clarifying the Road Ahead: Zenarmor's Strategic Vision and Product Roadmap

Recent updates, particularly with the release of Zenarmor 1.17 and the integration of new advanced capabilities like full TLS inspection, have sparked discussions among our partners and users regarding Zenarmor's commitment to supporting open-source firewalls and its evolution within the network security landscape. This blog post aims to dispel any confusion about our product roadmap, reaffirm our commitment to delivering top-tier security solutions, and address any concerns our loyal community may have.

Zenarmor Marketing TeamZenarmor Marketing Team
TLS Inspection Security

Zenarmor’s all-new Full TLS Inspection Capability - What to Expect in Zenarmor 1.17

If the title was not enough to give it away, the long-awaited full TLS inspection capability will be officially launched in Zenarmor 1.17 and is our latest enterprise-focused capability for users with existing business subscriptions.

Lyal SaaymanLyal Saayman
CASB Features

Why CASB is a need for Businesses?

Cloud has emerged as a transformative technology for all businesses regardles of their size and area of operation, as it provides access to sophisticated tools and capabilities needed to gain a technological edge without requiring substantial capital investment. However, along with this opportunity, there's also the hidden danger of security.

Zenarmor Marketing TeamZenarmor Marketing Team

Zenarmor Device Identification and Access Control - A Practical Guide

Device Identification and Access Control were introduced along with other new capabilities in Zenarmor 1.16, and are available with all paid subscription plans. This capability was built keeping in mind the importance of IT asset management (ITAM) in any organization and is our simple approach to this process, which can sometimes be a mammoth task to accomplish without the correct tools. Since its introduction, this new Zenarmor engine capability has been received well by the general Zenarmor community.

Lyal SaaymanLyal Saayman
The Challenge of Balancing Security and Productivity

The Challenge of Balancing Security and Productivity

Balancing cybersecurity with efficient workflow is a critical challenge in many organizations. Firewalls, while crucial for safety, can sometimes block access to websites needed for work. Zenarmor offers a practical solution to this problem through its bypass codes. These PIN codes are designed to grant users access to specific websites blocked by the firewall, ensuring that productivity is not hindered by security measures. This post will explore how Zenarmor’s bypass codes effectively bridge the gap between maintaining robust security and facilitating uninterrupted work.

Zenarmor Marketing TeamZenarmor Marketing Team
Enhance Network Security with Zenarmor's TLS Inspection Feature

Enhance Network Security with Zenarmor's TLS Inspection Feature

In today’s digital world, data security is more important than ever. Network security becomes challenging as more websites and applications use encryption to protect their data in transit. How can you ensure that the encrypted traffic on your network is not hiding malicious content or activities? The answer is TLS inspection.

Zenarmor Marketing TeamZenarmor Marketing Team
The Core of Network Security: Device Identification Defined

The Core of Network Security: Device Identification Defined

In this blog post, we will explore the definition and role of device identification in network security, the risks of unidentified devices, and how device identification empowers security with various controls. We will also give you a sneak peek at Zenarmor’s device identification feature, which is available in paid editions to enhance your network security.

Zenarmor Marketing TeamZenarmor Marketing Team
How Zenarmor Can Help Manufacturing Organizations Overcome Cybersecurity Challenges

How Zenarmor Can Help Manufacturing Organizations Overcome Cybersecurity Challenges

Cybersecurity has emerged as a critical concern in today's highly interconnected manufacturing domain. As manufacturing organizations embrace digital transformation, they face heightened vulnerabilities and sophisticated cyber threats. From safeguarding critical systems and IoT devices to defending against intellectual property theft, they must adopt effective security solutions to protect their operations and assets.

Zenarmor Marketing TeamZenarmor Marketing Team
Mastering Network Control with Advanced Policy-Based Filtering

Mastering Network Control with Advanced Policy-Based Filtering

Network control and security are vital for any organization that wants to protect its data and resources from cyber threats. However, traditional firewalls and network devices are often limited in their ability to handle the complexity and diversity of modern network traffic. How can you achieve granular and flexible control over your network without compromising performance or usability? The answer is advanced policy-based filtering.

Zenarmor Marketing TeamZenarmor Marketing Team
Transparent Security: How Web Blocking Explanations Enhance Online Safety

Transparent Security: How Web Blocking Explanations Enhance Online Safety

Web blocking explanations, an indispensable component of network security, play a pivotal role in safeguarding digital ecosystems. In an increasingly interconnected world, understanding the significance of these explanations is paramount. Web blocking explanations serve as the digital sentinels, elucidating the 'why' and 'how' behind the prohibition of certain web content. This transparency not only empowers administrators and end-users with insight but also aids in fostering a secure online environment.

Zenarmor Marketing TeamZenarmor Marketing Team
Step into Zenarmor's Integration Galaxy: Your Passport to Advanced Security

Step into Zenarmor's Integration Galaxy: Your Passport to Advanced Security

The digital landscape of today is fast-evolving, and comprehensive security insights are not just a luxury but have become an absolute necessity. Cyber threats evolve in complexity every day, making it vital for organizations to stay one step ahead. This is where integration comes into play.

Zenarmor Marketing TeamZenarmor Marketing Team
Streamline Enterprise Firewall Management with RESTful API

Streamline Enterprise Firewall Management with RESTful API

Imagine you are a network administrator who needs to monitor and control the network activity of hundreds or thousands of users in your organization. You want to ensure that your network is secure, compliant, and efficient, but you also want to respect the privacy and preferences of your users. How can you achieve this balance without spending hours on tedious manual tasks or compromising performance and reliability?

Zenarmor Marketing TeamZenarmor Marketing Team
Empower Your Network Security with User-Based Reporting

Empower Your Network Security with User-Based Reporting

Imagine you are a network administrator who needs to monitor and control the network activity of hundreds or thousands of users in your organization. You want to ensure that your network is secure, compliant, and efficient, but you also want to respect the privacy and preferences of your users. How can you achieve this balance without spending hours on tedious manual tasks or compromising performance and reliability?

Zenarmor Marketing TeamZenarmor Marketing Team
Beyond the Shadows: Why You Need Better Reporting Against Cyber Threats

Beyond the Shadows: Why You Need Better Reporting Against Cyber Threats

In network security, information is power. Enterprises rely on comprehensive data and insights to make informed decisions, enhance their security postures, and swiftly respond to emerging threats. This is precisely where our advanced security solution truly shines.
In this blog, we embark on a journey to explore the capabilities of advanced reporting with Zenarmor, shedding light on how they can empower organizations to bolster their cybersecurity strategies.

Zenarmor Marketing TeamZenarmor Marketing Team
Zenarmor Advanced Security Rules: Staying Ahead of Emerging Threats

Zenarmor Advanced Security Rules: Staying Ahead of Emerging Threats

The digital landscape that we are navigating today is ever-evolving. Staying ahead of emerging cyber threats is paramount for organizations of all sizes. As the sophistication of malicious intruders continues to grow, so must our defenses. This is where advanced security rules come into play; they are the frontline of defense in safeguarding your network, applications, and sensitive data.

Zenarmor Marketing TeamZenarmor Marketing Team
Gain Granular Control Over Web Access with Zenarmor Custom Web Profiles

Gain Granular Control Over Web Access with Zenarmor Custom Web Profiles

In the dynamic field of cybersecurity, the importance of tailored solutions cannot be overstated. As digital threats grow in complexity and diversity, organizations must have the tools to adapt and strengthen their defenses. This is precisely where the significance of custom web profiles in network security comes into play, offering a dynamic means of safeguarding digital landscapes against cyber threats.

Zenarmor Marketing TeamZenarmor Marketing Team
Strengthen Your Security Posture with Multiple Policies

Strengthen Your Security Posture with Multiple Policies

In cybersecurity, where threats get complicated, it's important to be flexible and strengthen your defenses. This article examines an essential way to improve your cybersecurity strategy: implementing multiple security policies. Like a secure web gateway (SWG) such as Zenarmor, which can be a key part of a DIY Secure Access Service Edge (SASE) setup, having different security rules in your organization's plan can boost its overall resilience.

Zenarmor Marketing TeamZenarmor Marketing Team
Advanced Security, Simplified Experience: Zenarmor’s Agile Approach to Safeguarding UK Students Online

Advanced Security, Simplified Experience: Zenarmor’s Agile Approach to Safeguarding UK Students Online

In today's interconnected digital age, school environments are no longer just physical spaces. They are also vast, intricate digital networks where students engage and learn.

However, as the children navigate this space with youthful curiosity, they face a barrage of risks that can often be invisible to the untrained eye. From harmful content like racism and extremist ideologies to insidious threats like phishing scams and online gambling, the online world presents challenges that can impact their mental, emotional, and even physical well-being

Zenarmor Marketing TeamZenarmor Marketing Team
Towards a device-agnostic netmap in the FreeBSD kernel

Towards a device-agnostic netmap in the FreeBSD kernel

As some might have already noticed, OPNsense’s 23.1.6 release has delivered some important kernel updates to the netmap subsystem. The goal of this blog post is to provide some insights into what we’ve been up to and what we’re planning to do in the future in the context of improving device driver support for the netmap subsystem in the FreeBSD kernel.

Murat BalabanMurat Balaban
Why is Zenarmor the perfect content-filtering solution for educational institutions?

Why is Zenarmor the perfect content-filtering solution for educational institutions?

It’s a necessity that educational institutions implement proper cyber security and access control measures, not only to protect their systems, teachers and administrators, but most importantly, the bright and impressionable minds accessing these systems and internet services. In this article, we are going to unpack the benefits and capabilities of Zenarmor and look at how it provides a formidable content filter, protecting minors and students alike from inappropriate online content and online threats.

Lyal SaaymanLyal Saayman
How MSSPs can leverage Zenarmor combined with open-source firewalls to increase the value of their offered services

How MSSPs can leverage Zenarmor combined with open-source firewalls to increase the value of their offered services

There has never been a more exciting time for MSSPs. With more businesses adopting the cloud and staff working remotely from anywhere, it can be challenging for organizations to navigate this new territory, especially when it comes to providing and managing their cybersecurity requirements. Here are all the ways Zenarmor favors MSSPs.

Lyal SaaymanLyal Saayman
How will Zenarmor SWG as a policy-driven cloud egress traffic filtering and control solution improve your network security?

How will Zenarmor SWG as a policy-driven cloud egress traffic filtering and control solution improve your network security?

In this article we are going to explore why Zenarmor SWG should be the first product to come to mind, when looking for a rapid-to-deploy, low-cost, cloud egress traffic filtering and control solution, with the ability to control all Zenarmor SWG deployments from a centralized control panel.

Lyal SaaymanLyal Saayman
How to use a cloud-deployed Zenarmor SWG to secure cloud resources and users in a DIY SASE architecture

How to use a cloud-deployed Zenarmor SWG to secure cloud resources and users in a DIY SASE architecture

If you're an enterprise or MSSP, you can now easily deploy Zenarmor as a Secure Web Gateway solution to keep your network safe and clean from malicious attacks on the internet.

Lyal SaaymanLyal Saayman
How OPNsense and Zenarmor® Next Generation Firewalls Help Schools Optimize their Networks and Increase Security

How OPNsense and Zenarmor® Next Generation Firewalls Help Schools Optimize their Networks and Increase Security

Typical educational institution computer networks, from K-12 to College and Universities, are much like enterprise networks. Devices ranging from mobile phones to tablets, desktop computers,…

Zenarmor Marketing TeamZenarmor Marketing Team