Skip to Content

Blog

Cyber ​​Security Glossary

June 9, 2025
VPN
SecureAccess
IdentityProviderProxy
IdPP

VPN: The perfect solution or a loose cannon?

January 23, 2025
VPN
SecureAccess
Identity Provider Proxy
IdPP

IAM vs ACM vs PAM vs ZTNA vs MFA

September 9, 2024
MFA
ZTNA
PAM

Cybersecurity bill: the evolution of the italian scene

July 10, 2024
SecureAccess
Compliance
ZTNA

Human Centered Design e Design Thinking for Oplon Secure Access

June 18, 2024
Oplon Secure Access
HCD
Design Thinking

From BYOD to PYOD: Protect Your Own Device

May 2, 2024
SecureAccess
BYOD

How AI can guess your password

March 11, 2024
Password
AI
Cybersecurity

Protecting ourselves in the digital realm: the importance of passwords

February 14, 2024
Password
Strong authentication
2FA

What are the authentication methods and which is the most effective

November 16, 2023
Authenticator
2FA
Secure Access

Why do IT organizations continue to use dangerous and expensive VPNs?

May 17, 2023
Secure Access
VPNs

Oplon Networks, IT security for Grandi Navi Veloci

October 25, 2022
Oplon Secure Access
Case Study

DoS & DDoS mitigation: guide to understand, when it works and when it doesn't

May 31, 2022
DDoS

2-factor authentication: here’s why E-commerce can’t do without it

July 12, 2021
2FA
Strong authentication

Oplon Commander: solutions for multi-cloud operations in complete safety

June 8, 2021
Multi-cloud
Orchestrator

Traffic Monetizer making event correlation reliable

June 1, 2021
Analytics

Maximum security and zero disputes in… two factors

May 31, 2021
2FA
Strong authentication

Two-factor authentication: the new frontier of secure access to web services

March 23, 2021
2FA
Strong authentication

Oplon Application Delivery Controller: uncompromising security and reliability

March 16, 2021
ADC

IT security passes through digital certificates

March 4, 2021
Digital certificates

5G and Starlink: a new era in internet connections

October 7, 2020
Networks

Oplon Global Distributed Gateway release 10 is out!

October 6, 2020
Release

Tool of reverse proxy and application balancer for Enterprise environments

September 3, 2020
Reverse proxy

Business Continuity (BC) and Disaster Recovery (DR): automatic decisions or human decisions?

May 27, 2020
Business continuity
Disaster recovery

eCommerce: strategies and investments for online sales

May 15, 2020
eCommerce

Business continuity: introduction to Business Continuity and Disaster Recovery

April 30, 2020
Business continuity
Disaster recovery

Smart Working: access to web applications for large organizations

April 30, 2020
Smart working

Smart Working: privacy and security thanks to digital certificates

April 20, 2020
Smart working
Privacy
Digital certificates
Covid-19

Smart Working: we make the company accessible safely from home

April 16, 2020
Smart working
Strong authentication
VPN

Coronavirus: the IT infrastructures have to adapt their sizing

March 14, 2020
Covid-19

DDoS Attack Mitigation: how not to lose money in eCommerce due to blocked services

February 28, 2020
DDoS
eCommerce
Last updated on