Bangkok Systems & Software, Inc. is a subsidiary of AST Cyber. This is a new company, and will have a full fledged line of consulting services surrounding the Zero Trust Framework, which also includes the following components:
*Privileged Access Management (PAM)
*Identity & Access Management (IAM)
*Privileged Identity Management (PIM)
*Cloud Infrastructure Entitlement Management (CIEM)
*Biometrics: Fingerprint Recognition, Iris Recognition, and Facial Recognition
*To get a breakdown of these terms, click here.
*To get a better understanding of the PAM market, download the latest Gartner report here.
*To view the Gartner Magic Quadrant of the PAM Vendors, click here.
*To understand the concepts of PAM, click here for a 70 page eBook from Cyber Ark.
*To get an overview of the PAM Solution from CyberArk, click on any of the two links:
To view the PowerPoint presentation, click here.
(NOTE: Right Click-->Open Link In New Window)
To view the PDF version, click here.
*For a quick overview of the CyberArk solution line, click here.
*To purchase our latest eBook on PAM, click here.
We have also just become an Authorized Partner of CyberArk, one of the top solutions providers in the PAM market.
*On April 14th, 2023, we attended the IAM/Active Directory Webinar hosted by Cyber Ark:
To view the PowerPoint presentation, click here.
(NOTE: Right Click-->Open Link In New Window)
To view the PDF version, click here.
*We also have a series of Certified Sales Professional (CSP) certifications from CyberArk:
To view our CSP Access cert, click here.
To view our CSP Endpoint Manager cert, click here.
To view our CSP DevSecOps cert, click here.
To view our CSP Cloud Entitlement Manager cert, click here.
To view our CSP Privileged Access Management cert, click here.
*We also have a series of Pre Sales Engineer certifications from CyberArk:
To view our Pre Sales Engineer Access cert, click here.
To view our Pre Sales Engineer Endpoint Manager cert, click here.
To view our Pre Sales Engineer DevSecOps cert, click here.
To view our Pre Sales Engineer Cloud Entitlement Manager cert, click here.
To view our Pre Sales Engineer Privileged Access Management cert, click here.
*View our first article here. It is all about the Zero Trust Framework, and how Biometrics plays an important role in the Multifactor Authentication (MFA) process.
*This same article has been published on the Keesing Journal Platform, based out of Amsterdam. You can see Part 1 (published on 9/27/2022) here.
*Part 2 of this article (published on 10/3/2022) can be seen here.
*Part 3 of this article (published on 10/10/2022) can be seen here.
*Part 4 of this article (published on 10/17/2022) can be seen here.
*Part 5 of this article (published on 10/24/2022) can be seen here.
We have received some glowing reviews on this article series, which include the following:
"The comment on the ZTF article series that comes to mind is from one of the co-authors of the articles I sent you on the Public Key Infrastructure. He found the articles “very instructive.” This particular individual is a member of Secure Identity Alliance as well as on the staff of the IN Groupe, Keesing’s parent company. You should consider his comment high praise."
-------------------------------------------------------
"ZTF Part 2 would be a great addition to the Keesing Platform. Our readers, including some of our expert authors, were especially impressed."
-------------------------------------------------------
*We just published a book through CRC Press. It is entitled: "The Zero Trust Framework: Threat Hunting & Quantum Mechanics". Click here to see the landing page.
*To purchase an eBook we have published on the Amazon KDP on the Zero Trust Framework, click here.
*We have published a massive eBook on how the Zero Trust Framework can be used to create a passwordless society. It is entitled: "ZTF: The Secret To A Seamless Authentication Experience." This will also be created into a series of articles, which will be Part #2. To see the landing page for this eBook, click here.
*Excerpts from this eBook have been published in Amsterdam, through the Keesing Journal of Documents and Identity:
To view Part 1, published on 5/17/2023, click here.
To view Part 2, published on 5/24/2023, click here.
To view Part 3, published on 5/31/2023, click here.
To view Part 4, published on 6/7/2023, click here.
*We have a published a massive whitepaper entitled "Deploying the Zero Trust Framework in Microsoft Azure". This same whitepaper will also be published as a book through CRC Press. To see the detials, click here.
The whitepaper can be purchased here.
The landing page for the book can be seen here.
*This eBook/published book will also comes with a Zero Trust Framework Risk Assessment Questionnaire, based upon the principles of the TAM/CIA Model:
*This survey will also be hosted, and it will be available here.
*We have also just signed a book contract with CRC Press entitled: "The Zero Trust Framework and Privileged Access Management (PAM)." Click here for details!!!
*We have also published a whitepaper on the above, click here to see it!!!
*Deploying the Zero Trust Framework In The Azure Active Directory
*Deploying the Zero Trust Framework In M365
*Deploying the Zero Trust Framework in M365: A Step By Step Guide
*A Comprehensive Guide To Deploying the Zero Trust Framework In The Azure Cloud
*How To Deploy The Zero Trust Framework For The Azure IaaS Platform
*How To Deploy The Zero Trust Framework For A Hub Based Virtual Network In Azure
*How To Deploy The Zero Trust Framework For Virtual Machines In Azure
*How To Deploy The Zero Trust Framework For Azure Cloud Storage
*How To Deploy The Zero Trust Framework For Azure Network Security
*The Microsoft Zero Trust Model
*The Latest Developments In Microsoft Zero Trust Model
*How To Deploy The Zero Trust Framework For Virtual Desktops In Azure
*Microsoft Case Studies Into The Zero Trust Framework
*How To Deploy The Zero Trust Framework In Azure Cloud For The United States Federal Government
*How To Secure Employee Identities In Azure Using The Zero Trust Framework
*How To Deploy The Zero Trust Framework For Azure Data Storage
*How To Deploy The Zero Trust Framework For The Azure IoT
*How To Deploy The Zero Trust Framework For Azure based AI In The Healthcare Industry
*How To Deploy PAM and PIM Into The Azure Active Directory
*Deploying The Zero Trust Framework overview In Azure Kubernetes And How To Deploy It
*Deploying The Zero Trust Framework For Azure Based Web Applications
*Deploying The Zero Trust Framework for DevOpsD & DevSecOps In Azure
*Deploying The Zero Trust Framework In Azure Sentinel
NOTE: To download a whitepaper on this, click here.
*Deploying The Zero Trust Framework For Azure Network Security Groups
*Deploying The Zero Trust Framework For The Azure Firewall/Web Applications
*How To Deploy The Zero Trust Framework Azure Conditional Access
*How To Deploy The Zero Trust Framework Azure Identity & Access Management
NOTE: To see a best practices guide, click here.
*How To Deploy The Zero Trust Framework For The Azure Cloud Adoption Framework
*Click here to see it!!!
We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.