Network security
With the growth of malware and data breaches, enterprises must ensure their networks -- and the applications and traffic on those networks -- are secure. Learn about important network security strategies and technologies, such as VPNs, Secure Access Service Edge (SASE), zero trust and software-defined perimeter (SDP).
Top Stories
-
Tutorial
21 Nov 2024
How to test firewall rules with Nmap
Using Nmap to identify potential shortfalls in the rules used to govern firewall performance gives teams an easy and cost-effective way to plug holes in their security frameworks. Continue Reading
By- Damon Garn, Cogspinner Coaction
-
Tip
18 Nov 2024
What CISOs need to know to build an OT cybersecurity program
More companies are tasking CISOs with operational technology security. But this oversight means a new strategy for those unfamiliar with building an effective OT security program. Continue Reading
By- Amy Larsen DeCarlo, GlobalData
- Sharon Shea, Executive Editor
-
Feature
10 May 2021
From EDR to XDR: Inside extended detection and response
As the definition of endpoints evolves, so too must the technology to protect them. Enter extended detection and response, or XDR -- one of cybersecurity's hottest acronyms. Continue Reading
By- Sharon Shea, Executive Editor
-
Feature
07 May 2021
Despite confusion, zero-trust journey underway for many
Zero trust is a catchy phrase with seemingly lofty goals. Uncover the reality behind one of infosec's hottest buzzphrases, and learn why it's within reach for many companies today. Continue Reading
By- Sharon Shea, Executive Editor
-
Tip
26 Apr 2021
8 remote access security risks and how to prevent them
Enterprises face myriad remote access security concerns, but training and clear communication can help them bolster their security programs for the long term. Continue Reading
By- Kevin Beaver, Principle Logic, LLC
-
Tip
23 Apr 2021
4 attributes key to network-as-a-service model
For a network-as-a-service model to work for the enterprise, it needs to offer four key attributes: an application-specific, elastic, secure and personalized VPN. Continue Reading
By- Tom Nolle, Andover Intel
-
News
16 Apr 2021
Aruba product integrations advance its SASE strategy
Aruba's latest SASE-related integrations involve the Silver Peak-based SD-WAN, Threat Defense and the ClearPass Policy Manager. More product integrations are likely. Continue Reading
By- Mike Gleason, News Writer
-
Tip
16 Apr 2021
6 SSH best practices to protect networks from attacks
SSH is essential, but default installations can be costly. Auditing and key management are among critical SSH best practices to employ at any organization. Continue Reading
By -
Definition
13 Apr 2021
attack vector
An attack vector is a path or means by which an attacker or hacker can gain access to a computer or network server in order to deliver a payload or malicious outcome. Continue Reading
By- Mary E. Shacklett, Transworld Data
-
Definition
12 Apr 2021
What is endpoint detection and response (EDR)?
Endpoint detection and response (EDR) is a system to gather and analyze security threat-related information from computer workstations and other endpoints, with the goal of finding security breaches as they happen and facilitating a quick response to discovered or potential threats. Continue Reading
By- Gavin Wright
- Alexander S. Gillis, Technical Writer and Editor
-
Tip
12 Apr 2021
Threat intelligence frameworks to bolster security
Organizations have many threat intelligence frameworks to work with, each with its own advantages. From for-profit to nonprofit, here's help to figure out which ones you need. Continue Reading
By- Johna Till Johnson, Nemertes Research
-
Tip
09 Apr 2021
Common network vulnerabilities and how to prevent them
It's not possible to eliminate all network vulnerabilities, but network teams can implement best practices to limit potential attacks and protect their networks. Continue Reading
By- David Jacobs, The Jacobs Group
-
Tip
08 Apr 2021
SASE options for the branch of one -- work from anywhere
More than ever, enterprises need to support individual employees that make up a branch of one. These setups require reliable connectivity, application performance and security. Continue Reading
By- Lee Doyle, Doyle Research
-
Definition
05 Apr 2021
cyber hijacking
Cyber hijacking, or computer hijacking, is a type of network security attack in which the attacker takes control of computer systems, software programs and/or network communications. Continue Reading
-
Tip
02 Apr 2021
Best practices for VPN traffic monitoring
VPNs are still a critical part of many enterprise remote access strategies. Networks teams that monitor VPN traffic should look at factors like application usage and overhead. Continue Reading
By -
Tip
01 Apr 2021
5 basic steps for effective cloud network security
In hybrid infrastructures, old network security systems won't work. Enterprises must adopt effective cloud network security strategies to keep their assets safe. Continue Reading
By- Amy Larsen DeCarlo, GlobalData
-
Feature
31 Mar 2021
How to build a honeypot to increase network security
Create a honeypot that will trap attackers and monitor their activities to enhance your organization's network security. This step-by-step guide takes you through the process. Continue Reading
By- Ben Lutkevich, Site Editor
-
Guest Post
18 Mar 2021
With 5G, security by design is a must
New tech means new security strategies. Deloitte's Wendy Frank and Shehadi Dayekh explain why this is especially true with 5G. Security by design, they advise, is a critical approach. Continue Reading
By- Wendy Frank and Shehadi Dayekh
-
Answer
18 Mar 2021
Compare Azure Firewall vs. NSGs for network security
Traffic to and from resources needs proper security to protect data, but the wrong tool could leave you vulnerable. Explore these two services to find the right level of protection. Continue Reading
-
Tip
15 Mar 2021
Endpoint security vs. network security: Why both matter
As the security perimeter blurs, companies often debate the merits of endpoint security vs. network security. However, it shouldn't be an either-or decision. Continue Reading
By- Andrew Froehlich, West Gate Networks
-
News
10 Mar 2021
News briefs: Koch Industries picks Alkira, Palo Alto
Koch industries combines Alkira networking and Palo Alto security for remote office connectivity; Cisco promotes three women on International Women's Day; AT&T, Fortinet partner. Continue Reading
By- Antone Gonsalves, News Director
-
Guest Post
08 Mar 2021
Enterprise edge is telecom operators' new frontier
Network operators have an opportunity to sell new bundles of dynamic enterprise edge services that include SASE, SD-WAN and virtual security if they size it and price it well. Continue Reading
By- Grant Lenahan
-
Feature
04 Mar 2021
How to become a threat hunter
Top threat hunters are creative and slightly contrarian, enabling them to think outside the box -- much like the best cybercriminals, according to one expert. Continue Reading
By- Alissa Irei, Senior Site Editor
-
Tip
26 Feb 2021
5 steps to conduct network penetration testing
Enterprises that want to ensure competent network security strategies should look at how they can implement penetration testing, considering red teams and physical pen tests. Continue Reading
By- John Cavanaugh, BlueAlly
-
Feature
25 Feb 2021
Get started with network penetration testing for beginners
Authentication, patching and configuration are among the most common vulnerabilities found through network penetration testing. Learn more in this free chapter excerpt. Continue Reading
By- Michaela Goss, Senior Site Editor
- Manning Publications Co.
-
Feature
25 Feb 2021
Advice on how to learn network penetration testing skills
As beginners learn network penetration testing skills, they should remember these expert tips: Pay attention to what the client wants, and stick to offense, not defense. Continue Reading
By- Michaela Goss, Senior Site Editor
-
Feature
23 Feb 2021
3 SASE case studies exploring real-world deployments
Three case studies demonstrate how SASE technology helps organizations securely connect geographically distributed workforces. Continue Reading
By- Alissa Irei, Senior Site Editor
-
News
17 Feb 2021
Palo Alto to buy Checkov creator, Bridgecrew
Palo Alto said it will acquire Bridgecrew, the developer of the static code analysis tool Checkov. DevOps teams use the open source tool to build cloud applications. Continue Reading
By- Antone Gonsalves, News Director
-
Tip
16 Feb 2021
7 steps for a network and IT security foundation
Enterprises should make it a habit to review their IT security systems, following steps that include network segmentation, multifactor authentication and security education. Continue Reading
By- Terry Slattery, NetCraftsmen
-
Feature
12 Feb 2021
SASE market emerges and grows as the 'wave of the future'
Secure Access Service Edge is the latest technology to garner industry buzz in networking and security. Although it's still relatively new, the technology is making waves. Continue Reading
By- Jennifer English, Executive Editor
-
Feature
08 Feb 2021
5 cybersecurity lessons from the SolarWinds breach
Ransomware attack simulations, accessing enterprise logs and pen testing software code are among the best practices cybersecurity pros suggest following the SolarWinds breach. Continue Reading
-
Tip
08 Feb 2021
How to secure remote access for WFH employees in 4 steps
The global pandemic caused mayhem on network security environments. Enterprises need to bring rigor back to their systems and tighten security for remote workers. Continue Reading
By- John Cavanaugh, BlueAlly
-
News
04 Feb 2021
Arista launches zero-trust security with a Forescout option
Arista's zero-trust security framework segments devices into groups and sets policies for network access. Forescout integration is available for dynamic device identification. Continue Reading
By- Antone Gonsalves, News Director
-
Tip
02 Feb 2021
SASE hype includes SD-WAN, but does it need to?
Much of the hype around Secure Access Service Edge features the importance of SD-WAN with SASE, but do the two need each other to thrive? Research says probably not. Continue Reading
By- Andrew Froehlich, West Gate Networks
-
Tip
01 Feb 2021
How to monitor home network traffic for added security
When addressing home network monitoring, track all connected devices, and take advantage of open source tools, like packet capture, to sniff out malicious traffic. Continue Reading
By- Amy Larsen DeCarlo, GlobalData
-
Tip
29 Jan 2021
How the SolarWinds vulnerability affects networking
The SolarWinds attack resulted in a bevy of network vulnerabilities, like masked traffic and backdoor access. Network teams should take the time to review their security strategies. Continue Reading
By -
Feature
22 Jan 2021
SolarWinds: Lessons learned for network management, monitoring
In this roundup of networking blogs, experts reveal the critical lessons learned from the SolarWinds hack in regard to network management and monitoring capabilities. Continue Reading
By- Michaela Goss, Senior Site Editor
-
Tip
21 Jan 2021
Adopting threat hunting techniques, tactics and strategy
Adopt threat hunting techniques that analyze the right data, detect anomalies, use frameworks and compare success metrics, combining manual techniques with AI and machine learning. Continue Reading
By- Johna Till Johnson, Nemertes Research
-
Tip
20 Jan 2021
10 network security tips in response to the SolarWinds hack
From perimeter protection to persistent patching, enterprises should regularly review, update and test their network security plans, especially in response to the SolarWinds hack. Continue Reading
By -
Tip
15 Jan 2021
Considerations for SASE management and troubleshooting
SASE opens new territory for network and security management and troubleshooting. Ultimately, teams should look for system usability and visibility into traffic flows and policies. Continue Reading
By- Terry Slattery, NetCraftsmen
-
Tip
14 Jan 2021
SASE challenges include network security roles, product choice
Secure Access Service Edge blends network and security functions. While this integration has its benefits, enterprises still need to address some SASE challenges. Continue Reading
By- John Cavanaugh, BlueAlly
-
Tip
12 Jan 2021
How to calculate SASE return on investment and costs
SASE return on investment will vary for each organization, depending on use cases and architecture requirements. But the metrics used to determine ROI and cost factors are the same. Continue Reading
By- Evgeniy Kharam, EK Cyber and Media Consulting
- Dmitry Raidman, Cybeats & Security Architecture Podcast
-
Tip
07 Jan 2021
Top 5 SASE use cases balance network connectivity, security
Secure Access Service Edge can enhance network performance and security controls for remote sites. Discover some of the other top SASE use cases and deployment options. Continue Reading
By- John Cavanaugh, BlueAlly
-
Feature
30 Dec 2020
5 networking startups helping enterprises adapt and prepare
Even in a global pandemic, these five networking startups continue to impress. Learn how their innovative technologies can help enterprises prepare for unforeseen challenges. Continue Reading
By- Alissa Irei, Senior Site Editor
-
Feature
21 Dec 2020
Top network attacks of 2020 that will influence the decade
You've heard of phishing, ransomware and viruses. Now, keep them in mind because one cybersecurity expert says these threats and more may cause IT headaches for the next decade. Continue Reading
By- Michaela Goss, Senior Site Editor
- Packt Publishing
-
Feature
21 Dec 2020
Advice for an effective network security strategy
Security audits, evaluations of tools and looking realistically at trending technologies are some ways an organization can ensure its network security is the best it can be. Continue Reading
By- Michaela Goss, Senior Site Editor
-
Quiz
21 Dec 2020
Test your network threats and attacks expertise in this quiz
Network security is an ever-changing subject, but many of its common threats have plagued IT pros for years -- and will likely continue to do so. See what you know in this quiz. Continue Reading
By- Michaela Goss, Senior Site Editor
- Packt Publishing
-
Tip
11 Dec 2020
Software-defined home offerings drive remote productivity
Say hello to software-defined home, a 'branch of one' package that combines professional-grade Wi-Fi, security, SD-WAN and centralized management for remote workers. Continue Reading
By- Lee Doyle, Doyle Research
-
Tip
11 Dec 2020
Building an effective security operations center framework
An effective security operations center framework combines monitoring and analysis platforms and threat intelligence services to help organizations respond to risks quickly. Continue Reading
By- Johna Till Johnson, Nemertes Research
-
Tip
03 Dec 2020
SASE model drives improved cloud and work-from-home security
Find out how the Secure Access Service Edge model provides increased work-from-home security and cloud access outside of the traditional enterprise data center access model. Continue Reading
By- John Burke, Nemertes Research
-
Tip
20 Nov 2020
Implementing an SDP architecture for added network security
A key component of a software-defined perimeter requires client authentication before connection, while also making a network's internals invisible to outsiders. Continue Reading
By- Terry Slattery, NetCraftsmen
-
Tip
12 Nov 2020
Microsegmentation networking: Nutanix Flow vs. VMware NSX HCI
Explore how microsegmentation improves network security and the differences in how Nutanix and VMware bring the technology to their software-defined hyper-converged infrastructures. Continue Reading
-
Answer
11 Nov 2020
How do VPN vs. cloud services compare for remote work?
As remote work becomes increasingly normal, IT teams must decide which remote access technologies will benefit employees more. VPN and cloud services are two top choices. Continue Reading
By- Andrew Froehlich, West Gate Networks
-
Feature
02 Nov 2020
Weighing the future of firewalls in a zero-trust world
Cybersecurity pros have been predicting the firewall's demise for years, yet the device is still with us. But does it have a place in zero-trust networks? One analyst says yes. Continue Reading
By- Alissa Irei, Senior Site Editor
-
Tip
02 Nov 2020
Why networks should apply security by design principles
Security by design incorporates security and risk management directly into network architecture, using segmentation and Agile infrastructure design. Continue Reading
By- John Cavanaugh, BlueAlly
-
Tip
30 Oct 2020
Security automation tools and analytics reshape SecOps efforts
To transition from being reactive to proactive in terms of cybersecurity threats, check out how SecOps teams can use security analytics and automation tools to make the change. Continue Reading
By- Johna Till Johnson, Nemertes Research
-
Tip
29 Oct 2020
Understanding the zero trust-SDP relationship
Zero trust is a complicated framework that spans the IT stack. Find out how software-defined perimeter can address zero trust's network-level access requirements. Continue Reading
By- John Burke, Nemertes Research
-
Tip
19 Oct 2020
Planning a zero-trust strategy in 6 steps
Launch a zero-trust strategy in six steps. Learn how to form a dedicated team, ask questions about existing security controls and evaluate the priority of zero-trust initiatives. Continue Reading
By- Johna Till Johnson, Nemertes Research
-
Tip
19 Oct 2020
Zero-trust implementation begins with choosing an on-ramp
Zero-trust security has three main on-ramps -- each with its own technology path. For a clear-cut zero-trust implementation, enterprises need to choose their on-ramp wisely. Continue Reading
By- Johna Till Johnson, Nemertes Research
-
Tip
19 Oct 2020
How to ensure a scalable SASE architecture
Don't assume all SASE architecture is the same, especially when it comes to scalability. Enterprises should consider distance to vendor PoPs, office locations and agent onboarding. Continue Reading
By- Evgeniy Kharam, EK Cyber and Media Consulting
-
Opinion
12 Oct 2020
What are some VPN alternatives for remote access?
VPN security has its imperfections, especially when tracking user data and online activity. Some VPN alternatives may provide different security elements for users. Continue Reading
By -
Answer
05 Oct 2020
How a network segmentation strategy works with SD-WAN
Legacy segmentation techniques are often unwieldy. But, as enterprises contemplate network segmentation with SD-WAN, they must understand their network environments and goals. Continue Reading
By -
News
02 Oct 2020
Cisco to acquire container security specialist Portshift
Cisco's acquisition of Israeli startup Portshift would add essential security tools for companies that use the Kubernetes system for deploying cloud-native applications. Continue Reading
-
Answer
02 Oct 2020
What does a VPN concentrator do?
As more employees work remotely and VPN use rises, VPN concentrators have become trendy. But what does a VPN concentrator do exactly, and how do you deploy one? Continue Reading
By- Terry Slattery, NetCraftsmen
-
Feature
28 Sep 2020
Network monitoring market converges with security analytics
As cyber attacks increase and enterprise networks require threat detection and protection, network monitoring and security analytics are converging for more comprehensive visibility. Continue Reading
By- Jennifer English, Executive Editor
-
Tip
23 Sep 2020
What's involved in VPN maintenance and management?
Before an organization's VPN is up and running, IT teams must address four important aspects of VPN maintenance and management to keep abreast of transforming security concerns. Continue Reading
By- Andrew Froehlich and Robbie Harrell
-
Answer
21 Sep 2020
Tips and tools for home network security monitoring
Homes now have more connected devices, which could become targets for hackers. Consequently, work-from-home employees should take certain steps to safeguard their networks. Continue Reading
By- Amy Larsen DeCarlo, GlobalData
-
Tip
18 Sep 2020
Top 4 firewall-as-a-service security features and benefits
Firewall-as-a-service offerings implement security policies across consolidated traffic headed to all locations. Learn about four security features and benefits of FWaaS. Continue Reading
By- Mike Chapple, University of Notre Dame
-
Answer
14 Sep 2020
3 ways to prevent DDoS attacks on networks
DDoS attacks on networks can result in devastating and expensive damage for organizations. Learn three ways to prevent and respond to DDoS attacks to keep company networks secure. Continue Reading
By- John Cavanaugh, BlueAlly
-
Answer
28 Aug 2020
Site-to-site VPN security benefits and potential risks
Not every enterprise needs the functionality of a standard VPN client. A site-to-site VPN may be a better choice for some companies, but it's not without risk. Continue Reading
By- Michael Heller, TechTarget
- Judith Myerson
-
Tip
27 Aug 2020
Best practices to maintain VPN security
Enterprises looking to maintain VPN security should focus on proper endpoint security and authentication, VPN server security and documentation for security policies. Continue Reading
By- John Cavanaugh, BlueAlly
-
Tip
10 Aug 2020
3 DDoS mitigation strategies for enterprise networks
Enterprises can choose from three major approaches to mitigate DDoS attacks on their networks: Buy from an ISP, do it themselves or use a CDN service. Continue Reading
By- John Cavanaugh, BlueAlly
-
Feature
29 Jul 2020
Network security in 2020 highlights zero trust, SD-branch
In this roundup of networking blogs, experts explore various aspects of network security -- from old and evergreen to new and innovative -- and the roles they play in 2020. Continue Reading
By- Michaela Goss, Senior Site Editor
-
Quiz
28 Jul 2020
IDS/IPS quiz: Intrusion detection and prevention systems
Want a baseline of your intrusion detection and prevention system knowledge? Test your insights with this IDS/IPS quiz. Continue Reading
By- Sharon Shea, Executive Editor
-
Feature
22 Jul 2020
Zero-trust framework ripe for modern security challenges
What is zero-trust security, and why deploy it now? Analysts explain its importance in the current IT era and how to get started with evaluation and implementation. Continue Reading
By- Alicia Landsberg, Senior managing Editor
-
Answer
21 Jul 2020
What's the difference between GRE and IPsec tunnels?
IPsec provides more comprehensive security for IP tunneling, while GRE tunnels work well when network teams need to tunnel with multiple protocols or multicast. Continue Reading
By- Terry Slattery, NetCraftsmen
-
Tip
15 Jul 2020
How to secure a home network for remote workforces
Remote workers rarely achieve the same network security at home that offices provide. Yet, with the right tools, remote workers can efficiently learn how to secure a home network. Continue Reading
By- Andrew Froehlich, West Gate Networks
-
Answer
10 Jul 2020
What are the risks of third-party VPN services?
IP address leaks, DNS service leaks and WebRTC transmissions could expose your online activities if you use certain unreliable third-party VPN services. Continue Reading
By- Andrew Froehlich, West Gate Networks
-
News
02 Jul 2020
Tech pros focus on application delivery during pandemic
Tech pros have added security, automation and session capacity to their application delivery infrastructure to support business operations during the pandemic. Continue Reading
By- Antone Gonsalves, News Director
-
News
26 Jun 2020
COVID-19 tech will fail without employee privacy
Businesses can choose from a growing number of mobile apps and Wi-Fi software to protect workers from COVID-19. But tech won't succeed without top-of-the-line privacy protection. Continue Reading
By- Antone Gonsalves, News Director
-
Answer
19 Jun 2020
How to prevent network eavesdropping attacks
One of the biggest challenges of network eavesdropping attacks is they are difficult to detect. Read about prevention measures to help keep your network safe from snoopers and sniffers. Continue Reading
By- Sharon Shea, Executive Editor
-
Tip
18 Jun 2020
What to know about VPN termination
Network teams make several decisions when designing a secure VPN. One of those is where in the network, logically, they will terminate the VPN tunnels. Continue Reading
By- Terry Slattery, NetCraftsmen
-
Answer
11 Jun 2020
Identifying and troubleshooting VPN session timeout issues
Troubleshooting VPN session timeout and lockout issues should focus first on isolating where the root of the problem lies -- be it the internet connection, the VPN vendor or the user device. Continue Reading
By- Michael Heller, TechTarget
- Matthew Pascucci
-
Answer
27 May 2020
Is VPN split tunneling worth the security risks?
Enabling VPN split tunneling may increase speed and decrease bandwidth use and costs, but it also increases the number of security vulnerabilities faced. Continue Reading
By- Sharon Shea, Executive Editor
-
Feature
21 May 2020
Top 5 VPN myths and misconceptions for IT organizations
Although VPN technology has its challenges, various misconceptions exist that can muddle IT teams' understandings of VPNs. Here are five common VPN misconceptions debunked. Continue Reading
By- Michaela Goss, Senior Site Editor
-
Tip
08 May 2020
How to protect the network from ransomware in 5 steps
Stronger network security could be the key to preventing a ransomware infection. Follow these five steps to protect your network from ransomware. Continue Reading
By- Kevin Beaver, Principle Logic, LLC
-
Quiz
06 May 2020
Test your cyber-smarts with this network security quiz
Show what you know about the topics covered in the May 2020 issue of Information Security magazine. If you get nine of 10 answers right, you'll also receive CPE credit! Continue Reading
By- Brenda L. Horrigan, Executive Managing Editor
-
Answer
04 May 2020
What are the differences between VPN and VDI services?
With a common denominator of 'virtual,' both VPNs and VDI are common in remote work strategies. However, the technologies differ in terms of cost, use cases and performance. Continue Reading
By- Andrew Froehlich, West Gate Networks
-
Feature
01 May 2020
AI-powered cyberattacks force change to network security
Companies now face sophisticated enemies using AI and machine learning tools for their attacks. It's a world of new dangers for those defending network systems and data. Continue Reading
By -
Opinion
01 May 2020
Plan now for the future of network security
How to battle well-funded, technologically sophisticated threats and ensure high-quality network performance? CISOs need a plan to meet network challenges now and in the future. Continue Reading
By- Ben Cole, Executive Editor
- E-Zine 01 May 2020
-
Tip
01 May 2020
The pros and cons of SD-WAN and remote access
SD-WAN could be a compelling option for enterprises that require remote access for mission-critical jobs. But IT teams should be aware of cost, training and implementation barriers. Continue Reading
By- Lee Doyle, Doyle Research
-
Feature
29 Apr 2020
Open Systems' SASE tech wins TechTarget innovation award
Open Systems' SASE platform helped tens of thousands of workers gain secure remote access during the COVID-19 crisis. Learn more about our new Network Innovation Award winner. Continue Reading
By- Alissa Irei, Senior Site Editor
-
News
28 Apr 2020
How telemedicine, SD-WAN helped two firms get back to work
COVID-19 is forcing companies to rethink their workplaces. Medical companies TrialCard and Vohra have turned to SD-WAN and telemedicine, respectively, to keep employees productive. Continue Reading
By- Antone Gonsalves, News Director
-
Feature
20 Apr 2020
Zero-trust management challenges outweighed by benefits
The zero-trust model's adoption, deployment and management challenges are easily outweighed by its ability to offset modern threats, IEEE senior member Jack Burbank advises. Continue Reading
By- Sharon Shea, Executive Editor
-
Feature
17 Apr 2020
A glossary of the VPN terminology you need to know
For organizations with remote workforces, VPNs can be an essential part of daily life. This VPN glossary explores the essential terms and phrases that constitute VPN services. Continue Reading
By- Michaela Goss, Senior Site Editor
-
Tip
15 Apr 2020
Tips to improve network visibility and security
Network visibility and security can be tricky, especially with the range of products available. These tips help teams pinpoint potential vulnerabilities and gauge the tools they need. Continue Reading
By- Terry Slattery, NetCraftsmen
- John Cavanaugh, BlueAlly
-
Feature
13 Apr 2020
What to include in an SD-WAN security checklist
SD-WAN security encompasses more than integrated security functionality. Find out which capabilities enterprises should look for when evaluating SD-WAN and security. Continue Reading
By- John Burke, Nemertes Research
-
Tip
09 Apr 2020
How SASE architecture integrates with network infrastructure
SASE architecture offers a compelling value proposition, as it converges networking and security services onto a single cloud platform. Explore how it works with existing infrastructure. Continue Reading
By- Steve Garson, SD-WAN Experts
-
Tip
08 Apr 2020
Why SASE adoption requires a paradigm shift
Enterprises preparing to adopt Secure Access Service Edge should understand how the architecture presents organizational and architectural challenges for network and security teams. Continue Reading
By -
Tip
03 Apr 2020
Comparing SASE vs. traditional network security architectures
Today's dispersed environments need stronger networking and security architectures. Enter cloud-based Secure Access Service Edge -- a new model for secure network access. Continue Reading
By- Dave Shackleford, Voodoo Security
-
Answer
02 Apr 2020
Considering the differences in LAN vs. WAN security
Given the differences in the security of LAN and WAN, enterprises need to guard against insider threats, secure against unauthorized access and potentially secure the edge, too. Continue Reading
By- Michael Heller, TechTarget