Network security
With the growth of malware and data breaches, enterprises must ensure their networks -- and the applications and traffic on those networks -- are secure. Learn about important network security strategies and technologies, such as VPNs, Secure Access Service Edge (SASE), zero trust and software-defined perimeter (SDP).
Top Stories
-
Tip
04 Dec 2024
How to recover from a DDoS attack
Learn how to recover from a DDoS attack and get operations back online quickly, while minimizing impact on customers and brand reputation. Continue Reading
By -
Tutorial
21 Nov 2024
How to test firewall rules with Nmap
Using Nmap to identify potential shortfalls in the rules used to govern firewall performance gives teams an easy and cost-effective way to plug holes in their security frameworks. Continue Reading
By- Damon Garn, Cogspinner Coaction
-
Feature
20 Oct 2022
VPN vs. zero trust vs. SDP: What's the difference?
For strong network security, many vendors say VPNs don't cut it anymore. Enter the zero-trust security model and SDPs. Continue Reading
By- Michaela Goss, Senior Site Editor
-
Definition
20 Oct 2022
compensating control (alternative control)
A compensating control, also called an alternative control, is a mechanism that is put in place to satisfy the requirement for a security measure that is deemed too difficult or impractical to implement at the present time. Continue Reading
-
Tip
19 Oct 2022
The future of VPNs in the enterprise
VPNs have been the workhorse of online connectivity. Enhancements to software and processing power in end devices will transform how companies use the technology going forward. Continue Reading
By- Terry Slattery, NetCraftsmen
-
Definition
13 Oct 2022
Secure File Transfer Protocol (SSH File Transfer Protocol)
SFTP is a term that refers to either Secure File Transfer Protocol or SSH File Transfer Protocol, and is a computing network protocol for accessing and managing files on remote systems. Continue Reading
By- Alexander S. Gillis, Technical Writer and Editor
-
Feature
12 Oct 2022
The history and evolution of zero-trust security
Before zero-trust security, enterprise insiders were trusted and outsiders weren't. Learn about the history of zero trust and the public and private sector efforts to adopt it. Continue Reading
-
Tip
12 Oct 2022
An overview of the CISA Zero Trust Maturity Model
A zero-trust framework blocks all attempts to access internal infrastructure without authentication. The CISA Zero Trust Maturity Model is a roadmap to get there. Continue Reading
By -
Feature
12 Oct 2022
7 steps for implementing zero trust, with real-life examples
More than a decade since the term's inception, zero-trust security is still much easier said than done. Here's how to get started. Continue Reading
By- Alissa Irei, Senior Site Editor
- Johna Till Johnson, Nemertes Research
-
Tip
11 Oct 2022
What is zero-trust network access? ZTNA basics explained
Zero-trust network access is touted as the solution to replace the VPN. As the potential future of network security, learn more about ZTNA, including its benefits and challenges. Continue Reading
By- John Burke, Nemertes Research
-
Feature
11 Oct 2022
How to choose the best ZTNA vendor for your organization
In a sea of options, finding the best ZTNA vendor for your organization can pose a major challenge. Weed through the marketing hype with advice from the experts. Continue Reading
By- Alissa Irei, Senior Site Editor
-
Tip
11 Oct 2022
Top 6 challenges of a zero-trust security model
Zero trust has a number of challenges, but because the model is highly beneficial, it's important for organizations to learn how to overcome them. Continue Reading
By- Sharon Shea, Dennis Turpitka
-
Tip
11 Oct 2022
How to conduct a cybersecurity audit based on zero trust
This checklist offers guidance on how to prepare for a zero-trust cybersecurity audit and helps document how well cybersecurity controls are performing based on CISA's ZTMM. Continue Reading
By -
Definition
06 Oct 2022
filter (computing)
The term filter in computing can mean a variety of things, depending on the technology or technical discipline in question. Continue Reading
By- Andrew Froehlich, West Gate Networks
-
Definition
05 Oct 2022
network security
Network security encompasses all the steps taken to protect the integrity of a computer network and the data within it. Continue Reading
By- Nick Barney, Technology Writer
- Ben Lutkevich, Site Editor
-
Tip
04 Oct 2022
How to build a zero-trust network in 4 steps
While network teams are responsible for deploying the elements of a zero-trust network, security teams should also be involved in developing the overall zero-trust framework. Continue Reading
By- Andrew Froehlich, West Gate Networks
-
Tip
04 Oct 2022
Top zero-trust use cases in the enterprise
Still hesitating to adopt zero trust? Learn about the main zero-trust use cases, as well as its benefits, myths and trends that are beginning to emerge. Continue Reading
By- Andrew Froehlich, West Gate Networks
-
Definition
29 Sep 2022
software-defined perimeter (SDP)
A software-defined perimeter, or SDP, is a security technique that controls access to resources based on identity and forms a virtual boundary around networked resources. Continue Reading
By- Sharon Shea, Executive Editor
-
Tip
29 Sep 2022
The 5 principles of zero-trust security
Zero trust is a journey, not a destination. Ensure your corporate network is safe from internal and external threats by implementing these five principles of zero-trust security. Continue Reading
By- Andrew Froehlich, West Gate Networks
-
Tip
28 Sep 2022
Why zero trust requires microsegmentation
Microsegmentation is a key security technique that enables organizations to achieve a zero-trust model and helps ensure the security of workloads regardless of where they are located. Continue Reading
By- Andrew Froehlich, West Gate Networks
- Sharon Shea, Executive Editor
-
Definition
28 Sep 2022
microsegmentation
Microsegmentation is a security technique that splits a network into definable zones and uses policies to dictate how data and applications within those zones can be accessed and controlled. Continue Reading
By- Chuck Moozakis, Editor at Large
- Laura Fitzgibbons
-
Tip
27 Sep 2022
How to get into cybersecurity with no experience
Cybersecurity needs new talent now more than ever, but landing that first job without a computer science degree can still be difficult. Here are five tips for getting in the door. Continue Reading
By- Ashwin Krishnan, StandOutin90Sec
-
Definition
23 Sep 2022
Google dork query
A Google dork query, sometimes just referred to as a dork, is a search string or custom query that uses advanced search operators to find information not readily available on a website. Continue Reading
-
Opinion
21 Sep 2022
Planning the journey from SD-WAN to SASE
Enterprises need integrated security and networking frameworks to manage distributed IT environments and are looking to SD-WAN and security options like SASE to get the job done. Continue Reading
By- Bob Laliberte, Former Principal Analyst
-
Enterprise Strategy Group
We provide market insights, research and advisory, and technical validations for tech buyers.
-
Answer
20 Sep 2022
How DKIM records reduce email spoofing, phishing and spam
Learn how implementing DomainKeys Identified Mail helps protect against phishing, spam and email forgery by digitally signing outgoing messages. Continue Reading
By- Peter Loshin, Former Senior Technology Editor
-
Tutorial
01 Sep 2022
How to create and add an SPF record for email authentication
Learn how to create Sender Policy Framework records to list authenticated mail servers for an email domain to fight spam, phishing, email forgery and other malicious email. Continue Reading
By- Peter Loshin, Former Senior Technology Editor
-
News
31 Aug 2022
VMware CEO reveals big changes amid multi-cloud shift
VMware plans to change products, strategic direction and marketing to keep up with customers rushing to deploy multi-cloud architectures. Continue Reading
By- Antone Gonsalves, News Director
-
Tip
23 Aug 2022
7 guidelines to secure network storage
These practices, including firmware and VPN guidance, protect NAS devices. Use these steps as standalone procedures or incorporate them into your overall security process. Continue Reading
By- Julia Borgini, Spacebarpress Media
-
Definition
12 Aug 2022
segregation of duties (SoD)
Segregation of duties (SoD) is an internal control designed to prevent error and fraud by ensuring that at least two individuals are responsible for the separate parts of any task. Continue Reading
By -
Tip
29 Jul 2022
SSH key management best practices and implementation tips
SSH connects key systems and the people and processes necessary to keep them functioning. Learn how to use SSH key management best practices to protect your systems and network. Continue Reading
By- Peter Loshin, Former Senior Technology Editor
-
Tip
28 Jul 2022
How to prevent a data breach: 10 best practices and tactics
When it comes to data breach prevention, the stakes are high. While it's impossible to eliminate the risk, organizations can minimize it by following these best practices. Continue Reading
By- Andrew Froehlich, West Gate Networks
-
Tip
27 Jul 2022
SSH2 vs. SSH1 and why SSH versions still matter
The Secure Shell protocol, SSH, was redesigned and released as SSH2 in 2006. While SSH1 lingers for legacy uses, find out how the protocols differ and why it's important. Continue Reading
By- Peter Loshin, Former Senior Technology Editor
- Mike Chapple, University of Notre Dame
-
News
12 Jul 2022
Counterfeit scheme trafficked in $1 billion in Cisco gear
A Florida man has been charged with running a counterfeit operation that duped hospitals, schools, government agencies and the military. Continue Reading
By- Madelaine Millar, TechTarget
-
Tutorial
11 Jul 2022
How to use SSH tunnels to cross network boundaries
The Secure Shell protocol authenticates and encrypts network connections. Find out how it's used to build tunnels while crossing private networks and even firewalls. Continue Reading
By- Peter Loshin, Former Senior Technology Editor
-
Tutorial
23 Jun 2022
Use ssh-keygen to create SSH key pairs and more
Learn how to use ssh-keygen to create new key pairs, copy host keys, use a single login key pair for multiple hosts, retrieve key fingerprints and more in this tutorial. Continue Reading
By- Peter Loshin, Former Senior Technology Editor
-
Opinion
22 Jun 2022
What's driving converged endpoint management and security?
Security and IT teams face challenges in managing and securing a growing number of endpoints, which is driving organizations to look for converged capabilities, according to ESG. Continue Reading
By- Mark Bowker, Senior Analyst
-
News
20 Jun 2022
Cisco customers eager for Meraki's Catalyst management
IT professionals were excited to see cloud-based Meraki management for Catalyst switches but were less enthusiastic over the new Cisco Security Cloud. Continue Reading
By- Madelaine Millar, TechTarget
- Antone Gonsalves, News Director
-
Tip
15 Jun 2022
How to evaluate security service edge products
As organizations become more cloud-centric and adapt to remote work, a new technique known as security service edge is gaining traction. Continue Reading
By- Ed Moyle, Drake Software
-
Feature
07 Jun 2022
Using SSH tunneling for good and evil
Secure Shell tunneling takes the secure application protocol to the next level for bypassing firewalls and creating secure connections everywhere. Continue Reading
By- Peter Loshin, Former Senior Technology Editor
-
Tip
01 Jun 2022
How zero trust unifies network virtualization
The combination of zero trust and network virtualization creates opportunities to strengthen security policies, increase cross-domain collaboration and improve overall visibility. Continue Reading
By- John Burke, Nemertes Research
-
Definition
10 May 2022
Top 10 spyware threats
The top 10 spyware list describes the 10 common spyware threats behind famous spyware attacks and is frequently identified by Webroot's Spy Audit, a free spyware scanner tool. Continue Reading
By -
Definition
09 May 2022
parameter tampering
Parameter tampering is a type of web-based cyber attack in which certain parameters in a URL are changed without a user's authorization. Continue Reading
By -
Definition
04 May 2022
SYN flood attack
A SYN flood attack is a type of denial-of-service (DoS) attack on a computer server. Continue Reading
By- Ben Lutkevich, Site Editor
-
Definition
28 Apr 2022
Sender Policy Framework (SPF)
Sender Policy Framework (SPF) is a protocol designed to restrict who can use an organization's domain as the source of an email message. Continue Reading
By- Peter Loshin, Former Senior Technology Editor
-
Answer
25 Apr 2022
What are the benefits and challenges of microsegmentation?
Administrators are assessing microsegmentation to beef up access control and security. But deploying microsegmentation can be complex. Continue Reading
By- Andrew Froehlich, West Gate Networks
-
Answer
21 Apr 2022
Comparing network segmentation vs. microsegmentation
Network segmentation and microsegmentation both control access but vary in how they do it, as well as how granular their approach is. Learn the differences here. Continue Reading
By- Andrew Froehlich, West Gate Networks
-
Definition
21 Apr 2022
security information management (SIM)
Security information management (SIM) is the practice of collecting, monitoring and analyzing security-related data from computer logs and various other data sources. Continue Reading
By -
Tip
11 Apr 2022
Zero trust, wireless WAN affect the future of IoT networking
Zero-trust security models, wireless WAN evolution and the emergence of pop-up businesses are all helping to fuel innovation in IoT networking capabilities. Continue Reading
By- John Burke, Nemertes Research
-
News
08 Apr 2022
Fortinet, Cato Networks add security for distributed SD-WANs
Fortinet updated FortiOS with an inline sandbox and a cloud access security broker. Cato has added new network access controls to its SASE service. Continue Reading
By- Madelaine Millar, TechTarget
-
Tip
01 Apr 2022
The pros and cons of Netskope SASE
Netskope is undoubtedly a leader in the CASB market, but its limited security capabilities and lack of SD-WAN make Netskope an incomplete SASE offering. Continue Reading
By- Steve Garson, SD-WAN Experts
-
Answer
29 Mar 2022
What is the role of machine learning in networking?
Incorporating machine learning tools into a network can help teams predict traffic flows, generate smarter analytics, monitor network health, tighten security measures and more. Continue Reading
By- John Burke, Nemertes Research
-
Feature
24 Mar 2022
SecOps and cybersecurity basics for NetOps teams
To bridge the gap between NetOps and SecOps teams, network pros should know security fundamentals, including different types of attackers, attacks and available security services. Continue Reading
By- Michaela Goss, Senior Site Editor
-
Tutorial
21 Mar 2022
NetOps vs. DevOps vs. NetSecOps: What's the difference?
DevOps, NetOps and NetSecOps ... oh my! These IT concepts have their differences, but at the end of the day, they're family. Here's how they relate. Continue Reading
By- Alissa Irei, Senior Site Editor
-
Definition
21 Mar 2022
What is NetOps? Everything you need to know
NetOps, also referred to as NetOps 2.0 and NetDevOps, is an approach to networking operations that uses DevOps tools and techniques to make network changes more efficiently and effectively than in the past. Continue Reading
By- Kate Gerwig, Editorial Director
-
News
18 Mar 2022
Startup OneLayer offers IoT security on cellular networks
Israeli startup OneLayer has launched from stealth with $8.2 million in seed funding and a software-based platform to secure IoT devices on private LTE and 5G networks. Continue Reading
By- Madelaine Millar, TechTarget
-
Definition
16 Mar 2022
network segmentation
Network segmentation is a networking architectural design that divides a network into multiple segments (subnets) with each functioning as a smaller, individual network. Continue Reading
-
Tip
15 Mar 2022
How to secure NetOps initiatives using Agile methodology
As more NetOps teams implement Agile methods, network and security testing must be part of a holistic approach that involves developers, networking and security teams working together. Continue Reading
By- John Cavanaugh, BlueAlly
-
Definition
11 Mar 2022
screened subnet
A screened subnet, or triple-homed firewall, refers to a network architecture where a single firewall is used with three network interfaces. Continue Reading
By -
Tip
09 Mar 2022
The rise of the NetOps engineer
The need for NetOps engineers with network automation and software development skills is rising with the continued drive to create more flexible networks. Find out what it takes. Continue Reading
By- Terry Slattery, NetCraftsmen
-
News
25 Feb 2022
Arista embeds security software in campus switches
Arista Networks will embed network detection and response software in campus switches to provide AI-driven threat detection across the network. Continue Reading
By- Madelaine Millar, TechTarget
-
Definition
25 Feb 2022
Internet Key Exchange (IKE)
Internet Key Exchange (IKE) is a standard protocol used to set up a secure and authenticated communication channel between two parties via a virtual private network (VPN). Continue Reading
By- Andrew Zola
- Alexander S. Gillis, Technical Writer and Editor
-
Tip
25 Feb 2022
A review of Zscaler SASE architecture
Zscaler has a strong cloud-native architecture for secure internet access. But it doesn't deliver SD-WAN or converge internet access and WAN security, leaving it with only part of a SASE platform. Continue Reading
By- Steve Garson, SD-WAN Experts
-
News
15 Feb 2022
Juniper acquires zero-trust security startup WiteSand
Juniper has acquired zero-trust security company WiteSand. The startup's cloud-native technology could find a home in Juniper's Mist and SASE platforms. Continue Reading
By- Madelaine Millar, TechTarget
-
News
09 Feb 2022
Palo Alto announces ML-enabled software update and firewalls
Palo Alto's updated PAN-OS software uses machine learning to analyze network traffic in real time, and two firewall appliances provide the processing power to support it. Continue Reading
By- Madelaine Millar, TechTarget
-
Definition
03 Feb 2022
access control list (ACL)
An access control list (ACL) is a list of rules that specifies which users or systems are granted or denied access to a particular object or system resource. Continue Reading
By- Ben Lutkevich, Site Editor
-
News
01 Feb 2022
Cato Networks adds CASB to growing SASE portfolio
Cato Networks has added CASB app visibility and enforcement capabilities to its growing SASE portfolio, and plans to add data loss prevention in the coming months. Continue Reading
By- Madelaine Millar, TechTarget
-
Feature
31 Jan 2022
Edge, public cloud, security drive network transformation
Networking is starting to reflect innovations in compute and public cloud. A notable change will be how network teams view networking and security as a holistic platform. Continue Reading
By- Jennifer English, Executive Editor
-
Tip
26 Jan 2022
Integrating zero-trust practices into private 5G networks
One of the first steps in deploying a technology is protecting it from potential security threats. Learn how to secure a private 5G network with zero-trust security practices. Continue Reading
By- Andrew Froehlich, West Gate Networks
-
Tip
18 Jan 2022
How to implement network segmentation for better security
For a network segmentation strategy to be effective and improve security, network teams need to create detailed security policies, identify each resource and use allowlists. Continue Reading
By- Terry Slattery, NetCraftsmen
-
Definition
04 Jan 2022
access log
An access log is a list of all requests for individual files -- such as Hypertext Markup Language files, their embedded graphic images and other associated files that get transmitted -- that people or bots have made from a website. Continue Reading
By -
Tip
30 Dec 2021
Explore 9 essential elements of network security
Network security isn't a one-size-fits-all strategy. Dive into the various segments of network security, and learn how they overlap and interact with each other. Continue Reading
By- Lee Doyle, Doyle Research
- Charles Kolodgy, Security Mindsets
-
Infographic
28 Dec 2021
Review the major networking acquisitions of 2021
When a networking vendor announces plans to acquire another company, most people take notice. Explore which vendors made moves in 2021 and what those purchases mean. Continue Reading
By- Jennifer English, Executive Editor
-
Tip
17 Dec 2021
5 trends in enterprise networking that defined 2021
In 2020, enterprises shifted to remote work due to the pandemic. The trend continued in 2021, along with four other networking trends that defined the year and will extend into 2022. Continue Reading
By- Elizabeth Thorne, TeleGeography
-
Definition
10 Dec 2021
virtual local area network hopping (VLAN hopping)
Virtual local area network hopping (VLAN hopping) is a method of attacking the network resources of a VLAN by sending packets to a port not usually accessible from an end system. Continue Reading
By -
News
01 Dec 2021
Palo Alto Networks and GTT to launch managed SASE platform
GTT Communications and Palo Alto Networks announced they will partner to offer a managed SASE platform using Prisma Access, Palo Alto's cloud-based security function. Continue Reading
By- Madelaine Millar, TechTarget
-
Feature
24 Nov 2021
Ultimate guide to secure remote access
This comprehensive secure remote access guide outlines the strategies, tools and best practices to provide anywhere access while protecting data, systems and users. Continue Reading
-
Feature
23 Nov 2021
SecOps' need for traffic data drives NetSecOps collaboration
Security teams want to analyze network traffic data to identify anomalies and threats. As a result, network and security teams need to find ways to work together. Continue Reading
By- Shamus McGillicuddy, Enterprise Management Associates
-
Definition
16 Nov 2021
CAPTCHA (Completely Automated Public Turing Test to Tell Computers and Humans Apart)
A CAPTCHA is a type of challenge-response system designed to differentiate humans from robotic computer programs. Continue Reading
-
Tip
15 Nov 2021
How zero-trust SDP can work with a VPN for remote work
Implementing software-defined perimeter and zero-trust security models with a corporate VPN adds significant layers of user and device verification and authentication. Continue Reading
By -
News
11 Nov 2021
AT&T launches a managed SASE offering with Cisco
AT&T aims its latest managed SASE service at enterprises using Cisco hardware. The offering's features range from firewall and secure web gateway functionality to DNS layer security. Continue Reading
By- Madelaine Millar, TechTarget
-
Tip
04 Nov 2021
Evaluate the components of Cisco SASE
Cisco's SASE platform, Umbrella, has all the components of a SASE architecture, but it has a lot of integration complexity and a reliance on appliances. Continue Reading
By- Steve Garson, SD-WAN Experts
-
Tip
01 Nov 2021
Adopt 5 best practices for hybrid workplace model security
As hybrid workforce models become the norm due to the pandemic, enterprises should look to best practices to ensure secure unified access for on-premises and WFH employees. Continue Reading
By- Johna Till Johnson, Nemertes Research
-
Tip
29 Oct 2021
Use network standardization to facilitate automation
Network teams can automate and standardize network designs to improve configurations, simplify operations and more easily implement changes within their networks. Continue Reading
By- Terry Slattery, NetCraftsmen
-
Definition
25 Oct 2021
payload (computing)
In computing, a payload is the carrying capacity of a packet or other transmission data unit. Continue Reading
By- Andrew Froehlich, West Gate Networks
- Peter Loshin, Former Senior Technology Editor
-
Definition
05 Oct 2021
Layer Two Tunneling Protocol (L2TP)
Layer Two Tunneling Protocol (L2TP) is an extension of the Point-to-Point Tunneling Protocol (PPTP) used by an internet service provider (ISP) to enable the operation of a virtual private network (VPN) over the internet. Continue Reading
By -
Answer
04 Oct 2021
Remote access vs. site-to-site VPN: What's the difference?
A remote access VPN connects remote users from any location to a corporate network. A site-to-site VPN, meanwhile, connects individual networks to each other. Continue Reading
By- Paul Kirvan
- Lisa Phifer, Core Competence
-
Feature
30 Sep 2021
6 reasons unpatched software persists in the enterprise
Patching is like flossing -- everyone knows they should do it, yet too few do it often and well. Explore why unpatched software is still ubiquitous, despite the risks. Continue Reading
By- Alissa Irei, Senior Site Editor
-
Feature
23 Sep 2021
Experts debate XDR market maturity and outlook
Is extended detection response still all buzz and no bite? Experts disagree on whether XDR qualifies as a legitimate market yet or still has a ways to go. Continue Reading
By- Alissa Irei, Senior Site Editor
-
Tip
21 Sep 2021
A review of Cato Networks' SASE Cloud platform
Cato's SASE Cloud lacks some features and may require customers to replace point products to fully benefit from the platform. But Cato aligns with SASE’s cloud-native vision and is a strong contender in the market. Continue Reading
By- Steve Garson, SD-WAN Experts
-
Definition
26 Aug 2021
stateful inspection
Stateful inspection, also known as dynamic packet filtering, is a firewall technology that monitors the state of active connections and uses this information to determine which network packets to allow through the firewall. Continue Reading
-
Tip
11 Aug 2021
A deep dive into Fortinet's SASE platform
Despite its strong security foundation, Fortinet's SASE platform lacks a cloud-native strategy and requires teams to stitch the architecture together. Continue Reading
By- Steve Garson, SD-WAN Experts
-
Definition
26 Jul 2021
network access control (NAC)
Network access control (NAC), also called network admission control, is a method to bolster the security, visibility and access management of a proprietary network. Continue Reading
-
Definition
22 Jul 2021
SYN scanning
SYN scanning is a tactic that a malicious hacker can use to determine the state of a communications port without establishing a full connection. Continue Reading
-
Definition
13 Jul 2021
passive attack
A passive attack is a network attack in which a system is monitored and sometimes scanned for open ports and vulnerabilities. Continue Reading
-
Answer
13 Jul 2021
The differences between PAP and CHAP
PAP uses a two-way handshake to authenticate client sessions, while CHAP uses a three-way handshake. Both authentication processes are common, but one is more secure. Continue Reading
By- Andrew Froehlich, West Gate Networks
- Mark Tuomenoksa, illumivu
-
Definition
08 Jul 2021
Snort
Snort is an open source network intrusion detection system (NIDS) created by Sourcefire founder and former CTO Martin Roesch. Continue Reading
-
Quiz
30 Jun 2021
12 official practice questions for the CCNA 200-301 exam
These practice questions for CCNA 200-301 lay out what readers need to know about network security and IP routing in the LAN, from 'CCNA 200-301 Official Cert Guide, Volumes 1 and 2.' Continue Reading
By- Michaela Goss, Senior Site Editor
- Jennifer English, Executive Editor
- Pearson Education
-
Feature
25 Jun 2021
How enterprises can close 5 major SASE gaps
Despite five major gaps that hamper SASE implementation, Gartner recommended enterprises should plan their migration timeline and aim to consolidate to a single vendor. Continue Reading
By- Deanna Darah, Site Editor
-
Opinion
25 Jun 2021
Hybrid workforce model needs long-term security roadmap
From SASE to ZTNA to EDR to VPNs, enterprises need to deploy the technologies to develop a secure hybrid workforce model now that can work into the future. Continue Reading
By- Andrew Froehlich, West Gate Networks
-
Answer
22 Jun 2021
How to use two VPN connections at the same time
Network managers and users might opt to set up two VPN connections at the same time, from the same remote device. But that might not be possible -- or safe. Continue Reading
By- Paul Kirvan
- Lisa Phifer, Core Competence
-
Report
15 Jun 2021
Guide to business continuity and pandemic planning
This guide explains the enterprise impact of the COVID-19 pandemic and how business continuity planning keeps organizations safe and in operation. Continue Reading
-
Tip
11 Jun 2021
The pros and cons of Palo Alto Networks' SASE platform
Palo Alto Networks is commonly mentioned in SASE discussions. While the vendor has strong security capabilities, it also brings integration complexities and PoP limitations. Continue Reading
By- Steve Garson, SD-WAN Experts