When the security design causes friction, the system will deteriorate and lead to gaps over time due to user action (or inaction). Great security solutions rarely fail on technical merits, but rather on human ones. However, it is possible to avoid this with security design which focuses on usability. The two — security and usability — do not need to be opposing forces. We cover the concept of "cybersecurity erosion" in this blog post below. https://lnkd.in/g3vksn5K #cybersecurity #cybersecurityerosion #devops #humandesign #infrastructure #security #cybersecurityawarenessmonth
Pomerium
Software Development
Los Angeles, California 1,970 followers
Authenticate, authorize, and secure user access to any application without a VPN.
About us
Pomerium is a zero-trust reverse proxy that helps enterprises manage secure application access. --- Authenticate, authorize, monitor, and secure user access to any application without a VPN. Access driven by identity and context. ---- Use your existing identity provider, such as Okta, Active Directory, Google, Gsuite, or OneLogin to add single-sign-on authentication to any application with Pomerium. Add access control to any app. --- Pomerium provides a standardized interface to add access control whether an application itself has authorization or authentication baked-in. Let developers focus on their apps, not reinventing access control.
- Website
-
https://www.pomerium.com
External link for Pomerium
- Industry
- Software Development
- Company size
- 11-50 employees
- Headquarters
- Los Angeles, California
- Type
- Privately Held
Locations
-
Primary
Los Angeles, California, US
Employees at Pomerium
-
Oleg Rogynskyy
Founder & CEO - SalesAI for Fortune500 ($200M, Andreessen, Iconiq, Lightspeed, YC - HIRING SALES LEADERS, AEs & ENGINEERS)
-
Missy (Melissa) Fogarty
Psychotherapist for Creatives - Private Practice at Missy Fogarty, MA, MT-BC, LCAT
-
Alexander Blachly
Professor of Music at University of Notre Dame
-
Nikhil Balaraman
Head of Marketing @ Pomerium
Updates
-
Happy New Year! 🎊 Data breaches, cyber attacks, and costly lawsuits continued to permeate December 2024 despite it being the holiday season. Here's to hoping that companies will implement more proactive preventative measures, and the number of data breach headlines will decrease this year. 🥂 Read the full compilation of December data breach headlines here: https://lnkd.in/dsRWh9AN
December 2024 Data Breaches [LIST]
pomerium.com
-
Watch Bobby DeSimone speak with Swapnil Bhartiya on TFiR about how Pomerium addresses identity and access management (#IAM) challenges with its identity-aware proxy solutions in addition to the company’s mission, growth, and key focuses for the future. Watch Bobby discuss the challenges of: 🌐 Simplifying access across hybrid, multi-cloud, and legacy environments 🔒 Ensuring real-time, context-aware authorization for both users and devices 🤝 Complementing major cloud providers and identity systems for seamless integration 📈 Growing from an open-source project to a venture-backed company with products such as #PomeriumZero for hybrid deployments 💡 Utilizing Generative AI to secure sensitive data and streamline policy creation Watch the full episode here: https://lnkd.in/dAhFQEQE
How Pomerium addresses IAM challenges with its identity-aware proxy solutions
https://www.youtube.com/
-
The market has rendered the term #zerotrust nearly meaningless, and as huge proponents of implementing Zero Trust Architecture, Pomerium wants to combat this jargon-ification by providing our input on zero trust pieces that can be found in the wild. By encouraging discussion, we hope to ‘Take Back Zero Trust.’ Check out our first Taking Back Zero Trust piece where we take a look at “Adaptive Trust: Zero Trust Architecture in a Financial Services Environment”, a white paper put out by the Bank Policy Institute. https://lnkd.in/geJm_ADU
Taking Back Zero Trust: Bank Policy Institute (BPI) provides a fairly reasoned take on Zero Trust
pomerium.com
-
🦃 Turkey, mashed potatoes, and gravy did not deter attackers as November continued to have its fair share of data breaches, cyber attacks, and costly lawsuits involving big name retailers and corporations. Read the full compilation of November data breach headlines here: https://lnkd.in/dSihPdd3
November 2024 Data Breaches [LIST]
pomerium.com
-
Integrate Pomerium with AWS EKS to provide fine grained access to any application hosted in AWS, regardless of how Authentication and Authorization is managed. Read the reference architecture here: https://lnkd.in/drD7VM-s
Reference Architecture: Using AWS EKS with Pomerium
pomerium.com
-
Visit our newly revamped Zero Trust landing page. Find convenient #zerotrust resources in one place: - 📝 Executive-level summary of Zero Trust - 📋 C-Level Guide to Zero Trust - 📚 Neutrally authoritative sources - And more! https://lnkd.in/ddbGYzZT
Zero Trust
pomerium.com
-
If users exhibit counterproductive behaviors to bypass security measures, something is wrong with the access control system. Security must be usable in order to be adopted, and this model is already within our reach. The future we all deserve can be deployed today. Watch Pomerium’s CEO Bobby DeSimone present a new user and application-centric model to the Cloud Security Alliance Working Group. https://lnkd.in/drwUM-DR
Zero Trust
circle.cloudsecurityalliance.org
-
You don’t need a VPN for PCI compliance! If anything, VPNs are costing companies money and making them less secure. Choose solutions that actually implement the standard's requirements, not those that just check a legacy compliance box. Debunk this expensive misconception, and review PCI DSS 4.0 line by line: https://lnkd.in/dmNS33QE
Gain PCI Compliance without a VPN
pomerium.com
-
Returning back to work after an energizing #KubeCon + #CloudNativeCon NA 2024! Our team is raving about meeting the passionate community, and we’re so happy we attended. Some highlights: - Bobby DeSimone spoke with Hayley Grossman (Run:ai), Emily Omier (The Business of Open Source), and Swapnil Bhartiya (TFiR) on topics ranging from AI to start-up business models to authentication and authorization! Keep an eye out for these interviews - Attended dozens of insightful talks from TikTok, Cisco, Istio, and more! - Conversed with 500+ attendees from all around the world - Ran out of our Stress Kube fidget toys Day 2 - Participated in KubeCrawl with freshly popped popcorn and drinks Thank you KubeCon! -- If you'd like to continue your learning, we're hosting a webinar on how to secure your #Kubernetes API and applications running within the Kubernetes cluster on November 20th, 10AM PT. Sign up here: pomerium.com/k8s-webinar
-
+1