<?xml version="1.0" encoding="UTF-8" ?><!-- generator=Zoho Sites --><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><atom:link href="https://www.lifutechnologies.co.za/blogs/tag/Documents/feed" rel="self" type="application/rss+xml"/><title>Lifu Technologies - Blog #Documents</title><description>Lifu Technologies - Blog #Documents</description><link>https://www.lifutechnologies.co.za/blogs/tag/Documents</link><lastBuildDate>Thu, 16 Apr 2026 13:30:58 -0700</lastBuildDate><generator>http://zoho.com/sites/</generator><item><title><![CDATA[All-in-one trusted platform and Immune to breaches]]></title><link>https://www.lifutechnologies.co.za/blogs/post/Bad-Actors-can-not-breach-businesses-that-adopt-stealth</link><description><![CDATA[<img align="left" hspace="5" src="https://www.lifutechnologies.co.za/Images/Bad actors can-t breach businesses that adopt stealth.png"/>immune to breaches from attack vectors like Malware/Ransomware, Port-scanning, Nation State attacks, DDOS attacks, Phishing, Code Injection, lateral movements, man-in-the-middle attacks, brute-force and infrastructure attacks.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_Hcvrvr1HSpulj2wXSumfuA" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_fxHeQQ11R_WkvtFULO418w" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_xIL8gTsrSVq5pljpmLNk1Q" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_lhrs02RgT4SLo_xMtK7IGw" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-align-center zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true"><span style="color:inherit;"></span><br/></h2></div>
<div data-element-id="elm_fMYUr7Dj_iAzEipo7wLTUA" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_fMYUr7Dj_iAzEipo7wLTUA"] .zpimage-container figure img { width: 800px ; height: 446.50px ; } } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-large zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Bad%20actors%20can-t%20breach%20businesses%20that%20adopt%20stealth.png" size="large" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_FXePjgQRRwS0gqbbpaNgTg" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><div style="color:inherit;"><p style="margin-left:0.5in;font-size:12pt;font-weight:400;"><span>ZafePass from Zafehouze ApS offers the following capabilities that can work well for many customers with IT and OT Networks<br/></span></p></div><div style="color:inherit;"><p style="margin-left:0.5in;font-size:12pt;font-weight:400;"><b><span><br/></span></b></p><ul style="text-align:left;"><li style="text-align:left;"><b><span>All-in-one trusted platform</span></b><span>: For the Enterprise where security, access management, file management and compliance work seamlessly together, minimising complexity and offers protection of known and unknown vulnerabilities <br/></span></li><li><span><b>I</b></span><b><span>mmune to breaches:</span></b><span>The Enterprise is immune to breaches from attack vectors like Malware/Ransomware, Port-scanning, Nation State attacks, DDOS attacks, Phishing, Code Injection, lateral movements, man-in-the-middle attacks, brute-force and infrastructure attacks. Offering the enterprise protection of their data, users and retains trust.</span></li><li><span><span style="font-weight:bold;">Virtual Private Connectivity:</span>&nbsp;Allows for point-2-point private, privileged and encrypted direct access between an employee and e.g. ERP server. These connections cannot be breached nor can information be extracted from them.</span></li></ul></div></div>
</div><div data-element-id="elm_HC-vGEXWRqGzPGD2Fil-Jw" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center zpbutton-align-mobile-center zpbutton-align-tablet-center"><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="/files/Lifu%20Branded%20Materials/Lifu%20Zafepass%20Business%20Benefits%20Brochure_Oct%202024.pdf" download title="Detailed business benefits" title="Detailed business benefits"><span class="zpbutton-content">Business flyer</span></a></div>
</div><div data-element-id="elm_qIJheNXlsjTy1KfP3TnCQw" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center zpbutton-align-mobile-center zpbutton-align-tablet-center"><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="/files/Lifu%20Branded%20Materials/Zafehouze%20LIFU%20draft-cybersecurity-framework-mapping-v1%2011-11-2023%2011-52-25-788%20copy.pdf" download title="How ZafePass Prevent &amp; Protect maps into various Security standards" title="How ZafePass Prevent &amp; Protect maps into various Security standards"><span class="zpbutton-content">For the CISO</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Sun, 24 Nov 2024 14:33:00 +0200</pubDate></item><item><title><![CDATA[Can you steal what can't be detected?]]></title><link>https://www.lifutechnologies.co.za/blogs/post/can-you-steal-what-can-t-be-detected</link><description><![CDATA[<img align="left" hspace="5" src="https://www.lifutechnologies.co.za/Zafepass - can you steal what can-t be detected.png"/>"You never change things by fighting the existing reality. To change something, build a new model that makes the existing model obsolete" R. Buckminister Fuller]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_r75yeQ3xTWSPC4SR-FL8aw" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_zEcJLN4jRRy4OK-YL4hIEQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_pK90rApOQA-MmXjato0UZA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_tu8g6HrwRe6zQz3Q-DwXJQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_tu8g6HrwRe6zQz3Q-DwXJQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;">&quot;You never change things by fighting the existing reality. To change something, build a new model that makes the existing model obsolete&quot; R. Buckminister Fuller</span></h2></div>
<div data-element-id="elm_6gqK2w5wTAm-vtCGeSxrGg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_6gqK2w5wTAm-vtCGeSxrGg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><p>Download this document and you can read how we can turn<br></p></div>
</div><div data-element-id="elm_e1CtBbpBOFNTYi--7vnFjg" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_e1CtBbpBOFNTYi--7vnFjg"] .zpimage-container figure img { width: 1047px !important ; height: 695px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_e1CtBbpBOFNTYi--7vnFjg"] .zpimage-container figure img { width:1047px ; height:695px ; } } @media (max-width: 767px) { [data-element-id="elm_e1CtBbpBOFNTYi--7vnFjg"] .zpimage-container figure img { width:1047px ; height:695px ; } } [data-element-id="elm_e1CtBbpBOFNTYi--7vnFjg"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Cyber%20Security%20thinking.png" width="1047" height="695" loading="lazy" size="original" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_sivINY4SVPlWwAyF44_21g" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_sivINY4SVPlWwAyF44_21g"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p style="text-align:center;">to this<br></p></div>
</div><div data-element-id="elm_Y6HfLgbPJyguJyfF7193FQ" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_Y6HfLgbPJyguJyfF7193FQ"] .zpimage-container figure img { width: 1070px ; height: 562.25px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_Y6HfLgbPJyguJyfF7193FQ"] .zpimage-container figure img { width:723px ; height:379.91px ; } } @media (max-width: 767px) { [data-element-id="elm_Y6HfLgbPJyguJyfF7193FQ"] .zpimage-container figure img { width:415px ; height:218.07px ; } } [data-element-id="elm_Y6HfLgbPJyguJyfF7193FQ"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Zafepass%20-%20can%20you%20steal%20what%20can-t%20be%20detected.png" width="415" height="218.07" loading="lazy" size="fit" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_Nqrje8JGQwuv1H6NOcRNow" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_Nqrje8JGQwuv1H6NOcRNow"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="/files/Lifu%20Branded%20Materials/Lifu%20-%20Why%20a%20Prevent%20and%20Protect%20Mindset%20is%20Changing%20Cyber.pdf" download><span class="zpbutton-content">Download</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Thu, 30 Nov 2023 13:07:47 +0200</pubDate></item><item><title><![CDATA[Paradigm-shift-in-Cyber-Security-approach?]]></title><link>https://www.lifutechnologies.co.za/blogs/post/Paradigm-shift-in-Cyber-Security-approach</link><description><![CDATA[<img align="left" hspace="5" src="https://www.lifutechnologies.co.za/Zafepass and OSI layers.png"/>The Zafepass Prevent & Protect platform are by design leveraging Guard-Railed, Micro- Perimeter, and De-perimeterization based methodologies for ‘access and security’]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_hMgjLv0JQdeOWnhflrJSXw" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_x5A3MPYfTQ6wBfdvgJRH3Q" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_iFc-nAz4Qme4dqOh-wxAsw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_C1baPGyAehhXFE8gBw6rBA" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_C1baPGyAehhXFE8gBw6rBA"] .zpimage-container figure img { width: 1070px ; height: 627.97px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_C1baPGyAehhXFE8gBw6rBA"] .zpimage-container figure img { width:723px ; height:424.32px ; } } @media (max-width: 767px) { [data-element-id="elm_C1baPGyAehhXFE8gBw6rBA"] .zpimage-container figure img { width:415px ; height:243.56px ; } } [data-element-id="elm_C1baPGyAehhXFE8gBw6rBA"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Zafepass%20and%20OSI%20layers.png" width="415" height="243.56" loading="lazy" size="fit" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_DZVCxiwVQ6WqMJ02iAUiYw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_DZVCxiwVQ6WqMJ02iAUiYw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><div style="color:inherit;"><h1><span>Zafepass Prevent &amp; Protect – Fast Facts Intro</span></h1></div></h2></div>
<div data-element-id="elm_1WnuUwfISVSa70A2VWTPrw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_1WnuUwfISVSa70A2VWTPrw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><div style="color:inherit;"><div><p><br></p><p style="text-align:left;"> The Zafepass Prevent &amp; Protect platform are by design leveraging&nbsp;<span style="color:inherit;">Guard-Railed, Micro- Perimeter, and De-perimeterization</span> based methodologies for ‘access and security’. </p><p style="text-align:left;"> These are innovative approaches that organizations would adopt to address the challenges posed by the evolving landscape of IT (Information Tech.), OT (Operational Tech.), and IoT (Internet of Things) environments. </p><p style="text-align:left;"> These approaches offer several advantages compared to traditional security measures like VPN (Virtual Private Network), PKI (Public Key Infrastructure), IAM (Identity and Access Management), CASB (Cloud Access Security Broker), DLP (Data Loss Prevention), and XDR (Extended Detection and Response), just to mention a few. </p><p style="text-align:left;"> Let's break down the advantages of the new approaches and the problems with the traditional ones: </p><p style="text-align:left;"> Advantages of Guard-Railed, Micro-Perimeter, and Deperimeterization: </p><ol style="text-align:left;"><li>Segmentation and Reduced Attack Surface: The Zafepass approach focus on micro-segmenting down to individual resources, the access and the user-sessions by creating isolated micro-perimeters around every asset, application and/or data. This segmentation reduces/minimizes the attack surface and make it impossible for threats to move laterally to any other ‘micro-perimeter’ (segment).</li><li>Granular Access Control: Instead of granting broad network access through VPNs, Zafepass enforce granular access controls including ‘environmental fingerprints’ ensuring only entitles users and devices are allowed access the specific resources they need. The risk of unauthorized access is hereby mitigated.</li><li>Beyond ZeroTrust, SASE, SSE, Software Defined Perimeter and alike: The Zafepass design exceeds ‘these frameworks’ in several ways. Assuming compromise of any- thing, least privileged access and constant validation has been part of our design for 20 years. Every access request is authenticated and authorized’ regardless of whether the request originates from inside or outside the perimeter. The design includes constant validation, advanced obfuscation and preventive mechanisms, as well as ephemeral connectivity and end-to-end dynamic encryption.</li><li>Adaptability to IoT and OT: As IoT and OT devices proliferate, traditional security solutions struggle to manage and secure these devices. The Zafepass Guard-Railed and Micro-Perimeter approaches are designed to handle the unique access and security challenges posed by these environments.</li><li>Contextual Awareness (Attribute Based Access, Communication and Identity Control): Zafepass Prevent &amp; Protect incorporate contextual awareness, taking into account, user behavior, device health, and other factors to make access decisions. Zafepass’ dynamic non-interruptive approach enhances security without causing unnecessary friction for legitimate users or lead to operational disruption.</li><li>Cloud-Centric Security: With organizations increasingly adopting cloud services, traditional security measures can become less effective. The Zafepass approaches are designed with cloud environments in mind, ensuring consistent security across on-premises and cloud-based resources.</li></ol><div><br></div><p style="text-align:left;"> Challenges with traditional solutions (VPN, PKI, IAM, CASB, DLP, XDR): </p><ol style="text-align:left;"><li>Limited Perimeter Protection: Traditional perimeter-based security, such as VPNs, relies on the assumption that internal network traffic is trusted. This approach becomes less effective as remote work, BYOD (Bring Your Own Device), and cloud services blur the traditional network boundaries.</li><li>Complexity and User Experience: Traditional solutions like VPNs and PKI can introduce complexity for users, leading to poor user experience. Users often find VPN connections cumbersome, and PKI management can be challenging.</li><li>Scalability Challenges: As organizations scale and adopt new technologies, managing identities and access control through IAM can become complex and resource-intensive.</li><li>Lack of Visibility: Traditional solutions might lack visibility into cloud services and applications, making it difficult to enforce consistent security policies across all environments.</li><li>Inadequate for IoT and OT:Traditional security solutions are often ill-equipped to handle the unique challenges posed by IoT and OT devices, which may have limited security capabilities and diverse communication protocols.</li><li>Alert Fatigue: Traditional security solutions like XDR and DLP can generate a high volume of alerts, leading to alert fatigue for security teams and potentially causing critical alerts to be overlooked.</li><li>Data Protection Challenges: While DLP solutions aim to prevent data loss, they might struggle to effectively monitor and protect data in decentralized, cloud- based, and IoT / OT environments.</li></ol><p style="text-align:left;"> Zafepass offer a more adaptive and dynamic approach to access, communication and security in today's complex IT, OT, and IoT landscapes. <br></p><p style="text-align:left;"><br></p><p style="text-align:center;"> All rights reserved. Zafehouze 2023 </p></div></div><p></p></div>
</div><div data-element-id="elm_ilm9UNljRj-CE4Lp4pdr-g" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md " href="javascript:;" target="_blank"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Tue, 07 Nov 2023 11:33:55 +0200</pubDate></item><item><title><![CDATA[Zafepass Prevent & Protect - NIST/ Data science 8V’s/ CIS 18 controls, MITRE ATT&CK/ Kill-Chain]]></title><link>https://www.lifutechnologies.co.za/blogs/post/zafepass-prevent-protect-nist-data-science-8v-s-cis-18-controls-mitre-att-ck-kill-chain</link><description><![CDATA[<img align="left" hspace="5" src="https://www.lifutechnologies.co.za/Images/Zafepass NIS.png"/>Zafepass Prevent & Protect - NIST / Data science 8V’s / CIS 18 controls, MITRE ATT&CK / Kill-Chain]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_UrOQ2Lc8ToGWZ6LAVY7ycQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_axj45nKaStK1FrOgvvcJVA" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_PBq6oJhXRMqJ32pA_o4Srg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_PBq6oJhXRMqJ32pA_o4Srg"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_-6XOtLcSRmqMMQDvealNdw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_-6XOtLcSRmqMMQDvealNdw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><div style="color:inherit;"><div><div><div><p><span style="font-size:20px;">Cyber-frameworks come in many variations – the main ones are NIST CSF, CIS, ISO, COBIT (ISACA), PCI, FedRAMP, CMMC – each with their own twist. </span></p><p></p></div>
</div></div></div></h2></div><div data-element-id="elm_KNtU5B1rT_6G3_-ruEF36Q" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_KNtU5B1rT_6G3_-ruEF36Q"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><div style="color:inherit;"><div><div><div><p><span style="font-size:11pt;">Frameworks are extensive, often complex and require ‘cyber-security expert and/or consultancy’ guidance. Frameworks are used as A) control- and steering-tool and B) by the security-industry for evaluating Cyber-security exposure (risk, likelihood, impact (mainly financial) and to suggest mitigation actions. </span></p><p><span style="font-size:11pt;">Organisations try to mitigate uncertainty, and these frameworks have grown, developed and adapted to IT-risk over 30-40 years. The last 5-10 years they have been challenged. Not only because they’ve grown in complexity, but also because the numbers of cyber-threats are exploding and now facing approx. 1,000 different KNOWN attack vectors, and according to the FBI and industry surveys, Cyber- criminals can ‘break in’ in less than 20 minutes – the slowest take less than 4 hours. </span></p></div>
</div></div></div><p></p></div></div><div data-element-id="elm_jIbL85MzQs-1HwXAR99tUg" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_jIbL85MzQs-1HwXAR99tUg"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="/files/NIST%20V8%20CIS%20MITRE%20Zafepass%20Input%20International%20-Lifu-.pdf" download><span class="zpbutton-content">Read on here</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Mon, 21 Aug 2023 09:58:30 +0200</pubDate></item><item><title><![CDATA[One Tool and Zero Trust]]></title><link>https://www.lifutechnologies.co.za/blogs/post/One-Tool-Zero-Trust</link><description><![CDATA[<img align="left" hspace="5" src="https://www.lifutechnologies.co.za/Images/One tool zero trust.png"/>A Holistic Unified ‘Zero-Trust Platform’ • The Solution to Hundreds of Use-cases • Will Increase Operational Resilience & Agility • Turn Cyber-criminal Activity to Unsuccessful • Improve Employee Efficiency & Productivity]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_ifmWq8WNRAyzSdQyzJx6Ow" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_q1ijNAyFSz2x5iKyqrc8hg" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_1BalDuiDSv-kyTu28bwvRw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_JhdAKGYATriNMV0TujyM0Q" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_JhdAKGYATriNMV0TujyM0Q"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true">A Unified platform, enabling greater flexibility and productivity for businesses<br></h2></div>
<div data-element-id="elm_lhRdzRE6S1iBRpP7dtUBiA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_lhRdzRE6S1iBRpP7dtUBiA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><div style="color:inherit;"><div><div><div><div><p><span style="font-size:14pt;">Zafepass takes secure connectivity to the next level— providing a global workforce with the ability to securely access assets, files, applications, servers and services from any device anywhere anytime.&nbsp;</span></p><p><span style="font-size:14pt;">With built-in Attribute Based Access &amp; Identity Control, End2End communication and file-storage encryption, fully controlled by IT, enhanced visibility applying granular </span><span style="font-size:14pt;">policy and real-time enforcement that help automate, efficiently and effectively using ITs scarce resources and time—all in contrast to the manually labor intensive current infrastructures and architectures.&nbsp;</span></p><p><span style="font-size:14pt;">Zafepass is easy to deploy on-site or as a SaaS solution, supports easy resource and user on-/off-boarding, granular Zero-Trust based security and highly scalable. </span></p></div>
</div></div></div></div><p></p></div></div><div data-element-id="elm_B9cdAwL_SMGLMpFBYjBovA" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_B9cdAwL_SMGLMpFBYjBovA"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="/Zafepass%20intro%20Apr22v4%20Client.pdf" download><span class="zpbutton-content">Download here</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Sun, 20 Aug 2023 12:34:34 +0200</pubDate></item><item><title><![CDATA[What is Prevent & Protect? Gard-Railed and Micro Perimeter-based Security?]]></title><link>https://www.lifutechnologies.co.za/blogs/post/Prevent-and-Protect</link><description><![CDATA[<img align="left" hspace="5" src="https://www.lifutechnologies.co.za/Images/Zafepass overview.png"/>Prevent & Protect enable access to any resource in IT, OT and/or IoT environments, automatically enforcing security policies and processes leveraging guard-railed and micro-perimeter security principles in order to establish the strongest security posture available.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_DYoKAunjRKKzZJlNAmyPPw" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_aebMQJiyS6612ejnDv8rNQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_5Wa89jctQGGUwhtb1YFD0Q" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_BnAL_wnyRkyZNi579leEcw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_BnAL_wnyRkyZNi579leEcw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true">A different approach<br></h2></div>
<div data-element-id="elm_-ZOh1JzuRWWfz4tKzKYluw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_-ZOh1JzuRWWfz4tKzKYluw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><div style="color:inherit;"><p><span>Prevent &amp; Protect enable access to any resource in IT, OT and/or IoT environments, automatically enforcing security policies and processes leveraging <b>guard-railed and micro-perimeter security principles</b> in order to establish the strongest security posture available and able to easily adapt to the ever-changing threat landscape.</span></p><style> @font-face {} @font-face {} p.MsoNormal, li.MsoNormal, div.MsoNormal { margin-top: 0cm; margin-right: 0cm; margin-bottom: 8pt; margin-left: 0cm; line-height: 107%; font-size: 11pt; font-family: "Calibri", sans-serif } .MsoChpDefault { font-size: 11pt; font-family: "Calibri", sans-serif } .MsoPapDefault { margin-bottom: 8pt; line-height: 107% } div.WordSection1 { page: WordSection1 } </style></div><p></p></div>
</div><div data-element-id="elm_A487grrgRPGphKqYryBjig" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_A487grrgRPGphKqYryBjig"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="/files/To%20be%20or%20not%20to%20be%20cyber%20resilient%20v2.pdf" download><span class="zpbutton-content">Download discussion paper</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Thu, 06 Jul 2023 12:10:56 +0200</pubDate></item><item><title><![CDATA[Cyber Security risk posture of your supply chain in one screen shot]]></title><link>https://www.lifutechnologies.co.za/blogs/post/Supply-Chain-Cyber-risk-in-one-dashboard</link><description><![CDATA[<img align="left" hspace="5" src="https://www.lifutechnologies.co.za/BlueVoyant SCD Portal.png"/> Managing distributed risk associated with hundreds and even thousands of vendors, suppliers, and partners is quic ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_Y1KOtx9rQhaoPdvF8TqtiA" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_mI3luC7eSHiP2pZBcmph5Q" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_PDz2lathQ1WVb3kMQbYpVw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_bcy3A0qvQXa-I7xaLrOgnw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_bcy3A0qvQXa-I7xaLrOgnw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><div style="color:inherit;"><div><div><div><div><p><span style="font-size:18pt;font-weight:700;">Identify, validate, prioritize, and confirm mitigation of cyber threats and vulnerabilities </span></p></div>
</div></div></div></div></h2></div><div data-element-id="elm_NmMGa5NpRK-ccpuzs8IAHw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_NmMGa5NpRK-ccpuzs8IAHw"].zpelem-text { border-radius:1px; margin-block-start:18px; } </style><div class="zptext zptext-align-center " data-editor="true"><div style="color:inherit;"><div><div><div><div><p><span style="font-size:10pt;font-weight:300;">Managing distributed risk associated with hundreds and even thousands of vendors, suppliers, and partners is quickly becoming the defining cybersecurity challenge in today’s increasingly complex environment. As organizations have increased the number and variety of third parties they work with, they have simultaneously exposed their enterprises to the vulnerabilities of those partners. </span></p></div>
</div></div></div></div><p></p></div></div><div data-element-id="elm_WKgnPmoUTOWKDQLcpJ8QeQ" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_WKgnPmoUTOWKDQLcpJ8QeQ"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="/files/Lifu%20Branded%20Materials/Lifu%20Terrain%20Supply%20Chain%20Defense.pdf" download><span class="zpbutton-content">Download here</span></a></div>
</div><div data-element-id="elm_SOVqxt0fdFl3lANebPFROA" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_SOVqxt0fdFl3lANebPFROA"] .zpimage-container figure img { width: 1070px ; height: 585.83px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_SOVqxt0fdFl3lANebPFROA"] .zpimage-container figure img { width:723px ; height:395.84px ; } } @media (max-width: 767px) { [data-element-id="elm_SOVqxt0fdFl3lANebPFROA"] .zpimage-container figure img { width:415px ; height:227.21px ; } } [data-element-id="elm_SOVqxt0fdFl3lANebPFROA"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/BlueVoyant%20SCD%20Portal.png" width="415" height="227.21" loading="lazy" size="fit" data-lightbox="true"/></picture></span></figure></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Fri, 31 Mar 2023 16:13:08 +0200</pubDate></item><item><title><![CDATA[Virtual CISO]]></title><link>https://www.lifutechnologies.co.za/blogs/post/Virtual-CISO</link><description><![CDATA[<img align="left" hspace="5" src="https://www.lifutechnologies.co.za/Virtual CISO logo.png"/> ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_d4fTtIjORMih7-1HRnKUsg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_53FoAkatRZ6mFF-f42WbnA" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_ITBzwbp4RI61hM5xNvRNow" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_9N8wevNoTtmyUnscqmBpIQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_9N8wevNoTtmyUnscqmBpIQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><div style="color:inherit;"><div><div><div><div style="color:inherit;"><h1>Improve your security posture while easing the burden on your team</h1></div><p></p></div>
</div></div></div></h2></div><div data-element-id="elm_Q4hTfnoLSTifRR4eYvj7EA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_Q4hTfnoLSTifRR4eYvj7EA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><div style="color:inherit;"><div><div><div><div style="color:inherit;"><div><div><div><div><span style="font-size:12px;font-weight:300;">BlueVoyant’s advisors can be your Virtual CISO to help execute planning, monitoring, and managing tasks. Whether you are planning to create or improve your compliance program, perform technology optimization and rationalization, or develop your security roadmap to improve posture, we can help. We can provide project-specific monitoring for compliance alignment or expert-level direction and planning in the areas of information assurance, governance, and information risk management. We can manage your vendor risk, compliance, or your security services oversight. </span></div></div>
</div></div></div><p><span style="font-size:10pt;font-weight:300;"><a href="/files/Lifu%20Branded%20Materials/Lifu%20BlueVoyant_Virtual%20CISO%20Solution%20Brief_060322_02-1.pdf" rel="" download="">Download full document here</a><br></span></p><p></p><p></p></div>
</div></div></div><p></p></div></div></div></div></div></div></div> ]]></content:encoded><pubDate>Fri, 31 Mar 2023 13:45:15 +0200</pubDate></item><item><title><![CDATA[Executive Cyber Guard]]></title><link>https://www.lifutechnologies.co.za/blogs/post/Solution-Brief-Executive-Cyber-Guard-Protection-for-your-most-valuable-asset</link><description><![CDATA[<img align="left" hspace="5" src="https://www.lifutechnologies.co.za/Exec guard teaser pic.png"/>Solution Brief Executive Cyber Guard Protection for your most valuable asset]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_d4fTtIjORMih7-1HRnKUsg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_53FoAkatRZ6mFF-f42WbnA" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_ITBzwbp4RI61hM5xNvRNow" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_9N8wevNoTtmyUnscqmBpIQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_9N8wevNoTtmyUnscqmBpIQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><div style="color:inherit;"><div><div><div><p><span style="font-size:10pt;font-weight:300;">In today’s digital age, the ability of attackers to execute cyber attacks against a specific individual has never been easier. With phishing attacks and social engineering on the rise, almost everyone is susceptible to be targeted by an attacker. </span></p></div>
</div></div></div></h2></div><div data-element-id="elm_Q4hTfnoLSTifRR4eYvj7EA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_Q4hTfnoLSTifRR4eYvj7EA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><div style="color:inherit;"><div><div><div><p><span style="font-size:10pt;font-weight:300;">Corporate executives are among<br> the most marked targets by hackers. In a recent study, 40% of global organizations cited their c-level executives, including the CEO, as their highest cybersecurity risk. <br></span></p><p><span style="font-size:10pt;font-weight:300;"><br></span></p><p><span style="font-size:10pt;font-weight:300;"><a href="/files/Lifu%20Branded%20Materials/Lifu%20BV_TI_Exec_Cyber_Guard_SB-2.pdf" rel="" download="">Download full document here</a><br></span></p><p></p></div>
</div></div></div><p></p></div></div><div data-element-id="elm_VwrxmwtiRBWh2HcjgxMP_A" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_VwrxmwtiRBWh2HcjgxMP_A"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="javascript:;" target="_blank"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Fri, 31 Mar 2023 11:46:42 +0200</pubDate></item></channel></rss>