Author: Kevin Sapp

Jenkins Screenshot

Secure Access to Jenkins on AWS

Many Jenkins servers are exposed directly to the internet making them susceptible to a wide variety of security threats, like the recent JenkinsMiner exploit. Learn how to configure secure access to your private Jenkins servers running on AWS using New Edge. Overview This video will guide you through configuring New Edge to provide secure access… Read More

Posted on

New Edge for Windows 10 Screenshot

New Edge for Windows 10 v1.0.693

The latest version of New Edge Access for Windows 10 is out now! Ensure that Windows devices are secure before granting access to sensitive enterprise apps and data. The latest version of New Edge Access for Windows 10 includes improved support for detecting and enforcing conditional access policies based on operating system version and third-party… Read More

Posted on

New Edge for Mac Screenshot

New Edge for Mac v1.3.1181

The latest version of New Edge Access for macOS is out now! Ensure that Macs are encrypted before granting access to sensitive enterprise apps and data. The latest version of New Edge Access for macOS includes improved support for detecting and enforcing conditional access policies based on operating system version and primary storage (hard drive)… Read More

Posted on

Salesforce Login Page

Conditional Access to Salesforce

Conditional access is a capability of New Edge that enables you to define conditions under which authorized users can access your corporate applications. Learn how to configure conditional access to Salesforce via the New Edge Secure Application Network. This video will guide you through configuring New Edge to provide secure access to Salesforce via New… Read More

Posted on

Cloud Computing and Nature Concept

Practical Advice on Cloud Hygiene

Reviewing and maintaining your cloud environment on a regular basis is an excellent habit to cultivate. Just like flossing and brushing your teeth, it prevents infections, decay, and saves a lot of money in the long run. I’m all for automating cloud operations and security. At a minimum, you should have robust identity management, log… Read More

Posted on