Our blog
At Zilla Security, Great Customer Experiences are More than a Marketing Slogan
For the third quarter in a row, G2, a leading software review and recommendation platform, recognized Zilla Security for consistently receiving an industry-high customer satisfaction rating.
Canaries are the Keys to Success in the Cloud
Do you struggle with how you integrate and obtain a holistic picture of identity and permission access for all of your applications?
From chaos to clarity: How Zilla’s integration capabilities drive coverage, efficiencies and time-to-value
Do you struggle with how you integrate and obtain a holistic picture of identity and permission access for all of your applications?
Sisense Breach – Stealing a Valet Lockbox
The breach of Sisense last week represents one of the most dangerous breaches of this year, and potentially longer. It’s not because of what data was exfiltrated directly from Sisense...
Embracing the Future of Identity Security and Governance with Zilla Security
The evolution of identity and access management in today's dynamic environment presents unprecedented challenges. As organizations transition from traditional on-premise setups to hybrid cloud environments, the complexity of managing access and the risks associated with it has magnified.
Extending Identity Governance to the Entire Organization – In the Cloud and On-Prem, with Zilla PO Box
Zilla Security commits to driving the industry forward with a cloud-first solution that delivers on the promise of rapid time to value with the release of Zilla PO Box...
Winning a Gold Globee Reaffirms Approach to Identity Security
At Zilla, we are laser focused on reinventing identity security at a time when identity has become the new security perimeter for an enterprise...
The High Society Sophisticated Threat Actors
Headlines of breaches frequently reference “highly sophisticated” attacks to cover up garden variety lapses in IAM programs...