Our Blog
Home / Blog

Why Visibility Is a Foundational Element of Effective Hybrid Cloud Management
Have you ever tried to make a decision when you don’t have visibility into the variables that go into that decision? It’s not easy to do. If you don’t believe me, try playing poker some time without taking a look at your cards, and see how comfortable you are making a...

It’s Time to Take a New Path to SASE
Chances are you’re reading this blog post from your laptop at home. Perhaps, you haven’t been in the office in weeks, if not months. Who knows when you’ll badge back into the lobby? And when you do, you’ll probably be sitting in one of those flexible, shared...

Titus’s inclusive software development process
Leaders weigh in on Titus’s new DevOps culture that embraces quality and security Quality and security are not just buzzwords when it comes to Titus’s software development priorities; they are the driving force for how the company develops its data...

All you need to know about the California Privacy Rights Act (CPRA)
As companies still struggled to come to terms with the compliance requirements of the California Consumer Privacy Act (CCPA), they were hit by a surprising piece of news: voters approved the California Privacy Rights Act (CPRA) following a privacy referendum held...

5G-Enabled Edges Require the Network and Security to Converge
Digital innovation, work-from-home, the Internet of Things, and other macro-trends have forced nearly every organization to redesign their networks to provide better business outcomes and user experiences. The so-called network perimeter, which was once a narrow point...