Fyde’s new wildcard support feature helps companies transition to Zero Trust faster

We’re very excited to announce our new feature - wildcard domain support to access resources. It is an important milestone for Fyde’s product arsenal since it will help companies, especially those that don't yet have a complete list of resources/workloads documented and configured. It will speed the adoption of the Zero Trust model and help companies transition and migrate from legacy systems.

How?
wildcard-min

Your Doorbell Camera Spied on You. Now What? 

Read
Fyde - The New York Times

Your Doorbell Camera Spied on You. Now What?

Read
Fyde - The New York Times

Fyde - The New York TimesYour Doorbell Camera Spied on You. Now What?

Read
 

Blog

By Evelina Sinkevičiūtė On March 18, 2020

What is SASE (Secure Access Service Edge)?

Fyde’s new wildcard support feature helps companies transition to Zero Trust faster

By Fyde On March 5, 2020

Unexpectedly working remotely? Fyde can help your team to secure access: 3 months for free

How Fyde implements Zero Trust to enhance security and productivity

By Fyde On January 29, 2020

3 steps to easily secure and manage privileged access

By Fyde On January 15, 2020

Exhibit A in the case for Zero Trust: Citrix ADC & Gateway vulnerabilities

By Evelina Sinkevičiūtė On January 8, 2020

Access to Kubernetes doesn’t have to be a burden

By Evelina Sinkevičiūtė On December 24, 2019

Fyde: Zero Trust architecture and components

Remote workers need a security upgrade. How Zero Trust can help

By Evelina Sinkevičiūtė On November 25, 2019

What are BYOD, COPE, and CYOD: which one is best for your enterprise?

By Dawn van Hoegaerden On October 15, 2019

Don’t bring your old security tech to the cloud. Lessons learned from Imperva and Capital One

Startups need to prioritize security. Zero Trust can be a lifesaver

By Evelina Sinkevičiūtė On October 3, 2019

When too much access leads to data breaches and risks

By Evelina Sinkevičiūtė On September 10, 2019

Modern enterprises cannot rely on VPNs anymore

By Evelina Sinkevičiūtė On August 14, 2019

What is Zero Trust and how can it transform your enterprise security?

By Evelina Sinkevičiūtė On July 27, 2019

The one time you should ignore your boss: when she sends you a phishing scam

By Evelina Sinkevičiūtė On June 20, 2019

Malicious texts take aim at your hard-earned cash

By Evelina Sinkevičiūtė On April 29, 2019

5 tips to secure your mobile banking and crypto trading

By Evelina Sinkevičiūtė On March 20, 2019

Crypto phishing: digital pickpockets are coming for your wallet

By Evelina Sinkevičiūtė On February 26, 2019

Public Wi-fi: handy, but risky. Tips for staying safe on the go

By Evelina Sinkevičiūtė On February 13, 2019

Protect yourself from spy apps and a vengeful ex

By Evelina Sinkevičiūtė On January 18, 2019

Why playing games on your iPhone can create backdoors. Don't get hit by malware

Taking GDPR to the next level: Fyde protects, not collects your personal data

By Evelina Sinkevičiūtė On December 13, 2018

Don’t be a victim. Avoid the new porn blackmail scam

By Evelina Sinkevičiūtė On November 5, 2018

3 easy steps to create a strong password

By Evelina Sinkevičiūtė On October 3, 2018

What are phishing, smishing and vishing?

By Sinan Eren On September 3, 2018

The paradigm shift

By Sinan Eren On July 13, 2018

No, not even U2F is going to stop phishing

By Fyde On May 16, 2018

Security vendors need to stop doing more harm than good

By Fyde On April 3, 2018

Hello, World!

Your Doorbell Camera Spied on You. Now What?

Read
Fyde - The New York Times

Your Doorbell Camera Spied on You. Now What?

Read
Fyde - The New York Times

Fyde - The New York TimesYour Doorbell Camera Spied on You. Now What?

Read
 

Blog

By Evelina Sinkevičiūtė On March 18, 2020

What is SASE (Secure Access Service Edge)?

Fyde’s new wildcard support feature helps companies transition to Zero Trust faster

By Fyde On March 5, 2020

Unexpectedly working remotely? Fyde can help your team to secure access: 3 months for free

How Fyde implements Zero Trust to enhance security and productivity

By Fyde On January 29, 2020

3 steps to easily secure and manage privileged access

By Fyde On January 15, 2020

Exhibit A in the case for Zero Trust: Citrix ADC & Gateway vulnerabilities

By Evelina Sinkevičiūtė On January 8, 2020

Access to Kubernetes doesn’t have to be a burden

By Evelina Sinkevičiūtė On December 24, 2019

Fyde: Zero Trust architecture and components

Remote workers need a security upgrade. How Zero Trust can help

By Evelina Sinkevičiūtė On November 25, 2019

What are BYOD, COPE, and CYOD: which one is best for your enterprise?

By Dawn van Hoegaerden On October 15, 2019

Don’t bring your old security tech to the cloud. Lessons learned from Imperva and Capital One

Startups need to prioritize security. Zero Trust can be a lifesaver

By Evelina Sinkevičiūtė On October 3, 2019

When too much access leads to data breaches and risks

By Evelina Sinkevičiūtė On September 10, 2019

Modern enterprises cannot rely on VPNs anymore

By Evelina Sinkevičiūtė On August 14, 2019

What is Zero Trust and how can it transform your enterprise security?

By Evelina Sinkevičiūtė On July 27, 2019

The one time you should ignore your boss: when she sends you a phishing scam

By Evelina Sinkevičiūtė On June 20, 2019

Malicious texts take aim at your hard-earned cash

By Evelina Sinkevičiūtė On April 29, 2019

5 tips to secure your mobile banking and crypto trading

By Evelina Sinkevičiūtė On March 20, 2019

Crypto phishing: digital pickpockets are coming for your wallet

By Evelina Sinkevičiūtė On February 26, 2019

Public Wi-fi: handy, but risky. Tips for staying safe on the go

By Evelina Sinkevičiūtė On February 13, 2019

Protect yourself from spy apps and a vengeful ex

By Evelina Sinkevičiūtė On January 18, 2019

Why playing games on your iPhone can create backdoors. Don't get hit by malware

Taking GDPR to the next level: Fyde protects, not collects your personal data

By Evelina Sinkevičiūtė On December 13, 2018

Don’t be a victim. Avoid the new porn blackmail scam

By Evelina Sinkevičiūtė On November 5, 2018

3 easy steps to create a strong password

By Evelina Sinkevičiūtė On October 3, 2018

What are phishing, smishing and vishing?

By Sinan Eren On September 3, 2018

The paradigm shift

By Sinan Eren On July 13, 2018

No, not even U2F is going to stop phishing

By Fyde On May 16, 2018

Security vendors need to stop doing more harm than good

By Fyde On April 3, 2018

Hello, World!

Blog

By Evelina Sinkevičiūtė On March 18, 2020

What is SASE (Secure Access Service Edge)?

Fyde’s new wildcard support feature helps companies transition to Zero Trust faster

By Fyde On March 5, 2020

Unexpectedly working remotely? Fyde can help your team to secure access: 3 months for free

How Fyde implements Zero Trust to enhance security and productivity

By Fyde On January 29, 2020

3 steps to easily secure and manage privileged access

By Fyde On January 15, 2020

Exhibit A in the case for Zero Trust: Citrix ADC & Gateway vulnerabilities

By Evelina Sinkevičiūtė On January 8, 2020

Access to Kubernetes doesn’t have to be a burden

By Evelina Sinkevičiūtė On December 24, 2019

Fyde: Zero Trust architecture and components

Remote workers need a security upgrade. How Zero Trust can help

By Evelina Sinkevičiūtė On November 25, 2019

What are BYOD, COPE, and CYOD: which one is best for your enterprise?

By Dawn van Hoegaerden On October 15, 2019

Don’t bring your old security tech to the cloud. Lessons learned from Imperva and Capital One

Startups need to prioritize security. Zero Trust can be a lifesaver

By Evelina Sinkevičiūtė On October 3, 2019

When too much access leads to data breaches and risks

By Evelina Sinkevičiūtė On September 10, 2019

Modern enterprises cannot rely on VPNs anymore

By Evelina Sinkevičiūtė On August 14, 2019

What is Zero Trust and how can it transform your enterprise security?

By Evelina Sinkevičiūtė On July 27, 2019

The one time you should ignore your boss: when she sends you a phishing scam

By Evelina Sinkevičiūtė On June 20, 2019

Malicious texts take aim at your hard-earned cash

By Evelina Sinkevičiūtė On April 29, 2019

5 tips to secure your mobile banking and crypto trading

By Evelina Sinkevičiūtė On March 20, 2019

Crypto phishing: digital pickpockets are coming for your wallet

By Evelina Sinkevičiūtė On February 26, 2019

Public Wi-fi: handy, but risky. Tips for staying safe on the go

By Evelina Sinkevičiūtė On February 13, 2019

Protect yourself from spy apps and a vengeful ex

By Evelina Sinkevičiūtė On January 18, 2019

Why playing games on your iPhone can create backdoors. Don't get hit by malware

Taking GDPR to the next level: Fyde protects, not collects your personal data

By Evelina Sinkevičiūtė On December 13, 2018

Don’t be a victim. Avoid the new porn blackmail scam

By Evelina Sinkevičiūtė On November 5, 2018

3 easy steps to create a strong password

By Evelina Sinkevičiūtė On October 3, 2018

What are phishing, smishing and vishing?

By Sinan Eren On September 3, 2018

The paradigm shift

By Sinan Eren On July 13, 2018

No, not even U2F is going to stop phishing

By Fyde On May 16, 2018

Security vendors need to stop doing more harm than good

By Fyde On April 3, 2018

Hello, World!