Impulse News and Buzz

News from Impulse and Beyond

Man with laptop preparing for the Arizona Technology Summit.

Impulse to Attend Arizona Technology Summit

Impulse will attend the 11th annual Arizona Technology Summit in September 2019. Impulse is pleased to announce that it will be at the 2019 Arizona Technology Summit. Impulse is the leading provider of Secure Access for traditional networks as well … Read More

Featured Post
People demonstrating a figurative illustration of what network segmentation is.

What is network segmentation?

Putting all your organization’s devices onto one public network and allowing VPN access to cloud-based resources without internal security is an ideal situation for hackers looking to steal data. But when internet connecting devices are everywhere from your phones to … Read More

Featured Post
Man surrounded by computers with screens showing the impacts of ransomware.

How to Prevent Ransomware from Affecting Businesses

A recent ransomware attack on Baltimore has affected city infrastructure such as hospitals, airports, and ATMs according to the Baltimore Sun. Yet the effects of ransomware are not limited to city infrastructure. Ransomware can affect everything from personal computers to … Read More

Featured Post

Impulse Announces New Network Security Solutions

SafeConnect’s New Editions Offer a Scalable and Affordable Way to Secure Networks TAMPA, FLA. (PRWEB) MAY 14, 2019–Impulse, the leader in context-aware network security and orchestration, announced the release of three separate Editions of its SafeConnect product. SafeConnect Essentials, Standard and … Read More

Featured Post

Impulse Featured in Innovate Tampa Bay

Impulse is pleased to announce its feature in the second volume of Innovate Tampa Bay. Innovate Tampa Bay includes 180 innovators and business icons that lead the way for innovation within the Tampa Bay Area. Read far beyond the Tampa … Read More

Featured Post
Man in hoodie with the words VPN Hack behind him. Showing the VPN vulnerability that shows the need for Zero Trust Network Access.

VPN Vulnerability Shows Need for Software Defined Perimeter

The Department of Homeland Security issued a warning last month about VPN packages from F5, Palo Alto, Pulse, and Cisco. According to Network World, these packages might fail to properly secure tokens and cookies. This could enable cyber criminals to … Read More

Featured Post
Couple shopping for the latest tech, theoretically including Network Access Control (NAC).

The State of Network Access Control

When it comes to controlling access to your network, there are three data points that are more important than any others. Knowing who accesses, what accesses and where your network is accessed from is critical to its continued security. A … Read More

Featured Post
Someone offers a tablet that reads "data security" with a pen to symbolize the need for Zero Trust to provide data security.

What is the Zero Trust Model

Zero Trust is a model for IT security in which access is only granted if the connecting devices and users are confirmed to be both authorized and authenticated. This is true regardless of the location of devices or their users. … Read More

Featured Post
Employee wrapped in caution tape representing an internal threat. Demonstrating the need for the Zero Trust model to protect against internal threats.

Insider Threats and the Zero Trust Model

In a world where the threat of attack from trusted insiders and penetrating outsiders within your network has increasing impact, you need to secure not only the borders of your organization’s network to defend against outside threats but the inside … Read More

Featured Post