Read unique technical insights from the BastionZero team
Learn how BastionZero works and get it working in your environment
Learn more about BastionZero from our resource center
Product Datasheet
In this datasheet, you'll learn: What the Trustless Access Platform is, the benefits of BastionZero, how BastionZero's Multi Root Trustless Access Protocol works, and what platforms BastionZero works with
Ebook
Let’s face it…zero trust is a more confusing concept than it should be. This is partly because “zero trust” is a massive misnomer. Unlike the name implies, a lot of trust must actually be exercised.
Whitepapers
Introducing BastionZero
Videos
Presented by Sharon Goldberg, CEO and CoFounder of BastionZero & Andy Ellis, Former CSO at Akamai, Operating Partner of YL Ventures
Listen to war stories and learn how to build secure infrastructure access systems! We chat about five classic incidents: FluffyBunny (2001), Operation Aurora (2009), DigiNotar (2011), NotPetya (2017), SolarWinds (2020) and why they suggest the industry definition of "zero-trust" is basically wrong.
BastionZero CEO, Sharon Goldberg, on Enterprise Security Weekly to talk all about zero trust.
Podcasts
BastionZero CEO, Sharon Goldberg, joins Anton on Google Cloud Security Podcast to talk Zero Trust
Chat with @Ethan_Heilman, CTO of @getBastionZero on how they are adding additional security when accessing remote infrastructure. BastionZero adds an additional separate Multi Factor Authentication into the authentication process and has a unique multi-root security model.
BastionZero CEO Sharon Goldberg's presentation on the basics of MFA in 2023 from Salt Lake City DevOps Days
Dr. Sharon Goldberg, CEO and CoFounder of BastionZero talks about Redefining Zero Trust for Remote Access in this podcast episode with The Podcast Channel of AST Cybersecurity.
Every devops team has its own religion around whether they will choose to self-host a service or outsource it to a SaaS. Do you self-host a SIEM or use a cloud-based offering? Use a self-hosted identity provider like keycloak or ADFS or a cloud-based identity provider like Okta or AzureAD? Run your own secrets manager or outsource this to a third party secret store? Host your own database or outsource to mongo atlas?
BastionZero CEO, Sharon Goldberg, at DevOps Days Raleigh speaking on how to Secure your CICD Pipeline