Blog

Keeping SharePoint Access Secure, Simply

October 18, 2016

As of 2013, more than 80% of Fortune 500 companies were using Microsoft SharePoint. But according to Dimensional Research, a staggering 97% SharePoint stakeholders have security concerns when giving access to third parties such as contractors, suppliers, franchisees and partners. Further, more companies are relying on the work of those » Read more

Akamai Acquires Soha Systems

October 4, 2016

I am excited to report that Akamai has acquired Soha Systems. The acquisition will complement Akamai’s strategy of securing, protecting and accelerating enterprise applications and services in the cloud. The press release covering the acquisition is here: https://www.akamai.com/us/en/about/news/press/2016-press/akamai-acquires-soha-systems-for-secure-remote-access-to-enterprise-applications.jsp When we started Soha Systems (formerly known as BubblewrApp) about 3 years » Read more

Key Trends Shaping Secure Third-Party Access

August 24, 2016

In a connected world, a business cannot function without multiple relationships with third parties – outside vendors, contractors, affiliates, partners and others. While the careless insider still tends to be viewed by experts as the weakest link in the security chain, the third-party contractor (with its own group of potentially » Read more

Remote SharePoint Access just got better. But not thanks to Microsoft.

June 23, 2016

Microsoft recently announced the availability of SharePoint 2016. The previews and subsequent delay in the release of SP’16 built a crescendo of hope for major changes, yet when it was released, people were still surprised that, well, not much has changed. The new mobile app is something many SharePoint customers » Read more

Trust in the Era of Hackable Certificate Authorities

June 2, 2016

The Internet is rapidly embracing end-to-end SSL/TLS security. The NSA surveillance leaks in 2013 kick-started the “encrypt everything” movement, and now Internet giants (Google, Yahoo, Facebook, Twitter, etc.,) are all offering their services over SSL/TLS. In addition, collaborative projects – such as cacert.org and Let’s Encrypt – and open source » Read more