Blog
Cyber Security Glossary
June 9, 2025VPN
SecureAccess
IdentityProviderProxy
IdPP
VPN: The perfect solution or a loose cannon?
January 23, 2025VPN
SecureAccess
Identity Provider Proxy
IdPP
IAM vs ACM vs PAM vs ZTNA vs MFA
September 9, 2024MFA
ZTNA
PAM
Cybersecurity bill: the evolution of the italian scene
July 10, 2024SecureAccess
Compliance
ZTNA
Human Centered Design e Design Thinking for Oplon Secure Access
June 18, 2024Oplon Secure Access
HCD
Design Thinking
From BYOD to PYOD: Protect Your Own Device
May 2, 2024SecureAccess
BYOD
How AI can guess your password
March 11, 2024Password
AI
Cybersecurity
Protecting ourselves in the digital realm: the importance of passwords
February 14, 2024Password
Strong authentication
2FA
What are the authentication methods and which is the most effective
November 16, 2023Authenticator
2FA
Secure Access
Why do IT organizations continue to use dangerous and expensive VPNs?
May 17, 2023Secure Access
VPNs
Oplon Networks, IT security for Grandi Navi Veloci
October 25, 2022Oplon Secure Access
Case Study
DoS & DDoS mitigation: guide to understand, when it works and when it doesn't
May 31, 2022DDoS
2-factor authentication: here’s why E-commerce can’t do without it
July 12, 20212FA
Strong authentication
Oplon Commander: solutions for multi-cloud operations in complete safety
June 8, 2021Multi-cloud
Orchestrator
Traffic Monetizer making event correlation reliable
June 1, 2021Analytics
Maximum security and zero disputes in… two factors
May 31, 20212FA
Strong authentication
Two-factor authentication: the new frontier of secure access to web services
March 23, 20212FA
Strong authentication
Oplon Application Delivery Controller: uncompromising security and reliability
March 16, 2021ADC
IT security passes through digital certificates
March 4, 2021Digital certificates
5G and Starlink: a new era in internet connections
October 7, 2020Networks
Oplon Global Distributed Gateway release 10 is out!
October 6, 2020Release
Tool of reverse proxy and application balancer for Enterprise environments
September 3, 2020Reverse proxy
Business Continuity (BC) and Disaster Recovery (DR): automatic decisions or human decisions?
May 27, 2020Business continuity
Disaster recovery
eCommerce: strategies and investments for online sales
May 15, 2020eCommerce
Business continuity: introduction to Business Continuity and Disaster Recovery
April 30, 2020Business continuity
Disaster recovery
Smart Working: access to web applications for large organizations
April 30, 2020Smart working
Smart Working: privacy and security thanks to digital certificates
April 20, 2020Smart working
Privacy
Digital certificates
Covid-19
Smart Working: we make the company accessible safely from home
April 16, 2020Smart working
Strong authentication
VPN
Coronavirus: the IT infrastructures have to adapt their sizing
March 14, 2020Covid-19
DDoS Attack Mitigation: how not to lose money in eCommerce due to blocked services
February 28, 2020DDoS
eCommerce
Last updated on