Network security
With the growth of malware and data breaches, enterprises must ensure their networks -- and the applications and traffic on those networks -- are secure. Learn about important network security strategies and technologies, such as VPNs, Secure Access Service Edge (SASE), zero trust and software-defined perimeter (SDP).
Top Stories
-
Tip
18 Nov 2024
What CISOs need to know to build an OT cybersecurity program
More companies are tasking CISOs with operational technology security. But this oversight means a new strategy for those unfamiliar with building an effective OT security program. Continue Reading
By- Amy Larsen DeCarlo, GlobalData
- Sharon Shea, Executive Editor
-
Answer
18 Nov 2024
Network security management challenges and best practices
A comprehensive and scalable network security management plan is more important than ever in the face of ever-rising threats and attacks orchestrated by bad actors. Continue Reading
By- Amy Larsen DeCarlo, GlobalData
-
News
01 Apr 2020
CloudGenix-Palo Alto buy combines SD-WAN with cloud security
The CloudGenix-Palo Alto Networks acquisition will combine the Prisma cloud security suite with CloudGenix's software-defined WAN. Continue Reading
By- Antone Gonsalves, News Director
-
News
24 Mar 2020
Cisco security GM discusses plan for infosec domination
At RSA Conference 2020, Gee Rittenhouse, senior vice president and general manager of Cisco's security group, talks about the company's strategy to reshape the infosec industry. Continue Reading
By- Rob Wright, Senior News Director
-
Feature
24 Mar 2020
Experts say CIA security triad needs a DIE model upgrade
Using a distributed, immutable, ephemeral strategy instead of the traditional CIA triad could enable enterprises to encourage security by design and minimize risk, two experts say. Continue Reading
By- Michael Heller, TechTarget
-
Tip
06 Mar 2020
The convergence of networking and security at the edge
Networking and security are converging with offerings like SD-WAN and SD-branch. But enterprises and vendors must overcome IT silos that delay innovation and decision-making. Continue Reading
By- Lee Doyle, Doyle Research
-
Tip
04 Mar 2020
Plan a VPN and remote access strategy for pandemic, disaster
Disasters and pandemics occur unexpectedly, affecting companies, workers and networks alike. Plan a remote access strategy that covers VPN requirements, bandwidth demands and licenses. Continue Reading
By -
Feature
28 Feb 2020
Network traffic analysis best practices: Assess and repeat
Network traffic analysis best practices require network teams to work closely with security teams and constantly assess their tool sets, analysis processes and traffic patterns. Continue Reading
By- Jennifer English, Executive Editor
-
News
26 Feb 2020
CISA chief can't guarantee election security
CISA Chief Christopher Krebs told RSA attendees he can't guarantee election security. Krebs also discussed CISA's efforts against Iranian hackers and ransomware attacks. Continue Reading
By- Antone Gonsalves, News Director
-
Answer
26 Feb 2020
Wired vs. wireless network security: Best practices
Explore the differences between wired and wireless network security, and read up on best practices to ensure security with or without wires. Continue Reading
By- Mike Chapple, University of Notre Dame
-
News
24 Feb 2020
Cisco SecureX provides front end for all security tools
Cisco SecureX, unveiled at RSA, provides centralized intelligence from all the vendor's security products. Also at RSA, Juniper adds encrypted traffic analysis to the Juniper ATP Cloud. Continue Reading
By- Antone Gonsalves, News Director
-
News
24 Feb 2020
Cisco launches SecureX platform for integrated security
At RSA Conference 2020, Cisco unveiled SecureX, which integrates the vendor's security portfolio into a single platform with enhanced visibility and automation. Continue Reading
By- Rob Wright, Senior News Director
-
News
14 Feb 2020
Latest Cisco earnings show tech buyers remain skittish
The latest Cisco earnings report shows customers paused tech spending despite a stabler global economy, while the impact of the coronavirus outbreak in China was a looming unknown. Continue Reading
By- Antone Gonsalves, News Director
-
Feature
30 Jan 2020
A look inside 'CCNA 200-301 Official Cert Guide, Volume 2'
Network security is a crucial skills area for network engineers, and the CCNA 200-301 reflects this. Here's a chapter excerpt on network security from the new guide. Continue Reading
By- Michaela Goss, Senior Site Editor
- Pearson Education
-
News
28 Jan 2020
Cisco Cyber Vision targets industrial IoT security
Cisco Cyber Vision is the networking company's latest product for industrial IoT security. The technology is based on software Cisco acquired last year when it bought Sentryo. Continue Reading
By- Antone Gonsalves, News Director
-
Tip
27 Jan 2020
Protect against evolving data security threats
As data security threats evolve, knowing how to protect your data is more important than ever. Learn about the latest security threats and how to ward them off. Continue Reading
By- Kevin Tolly, The Tolly Group
-
News
22 Jan 2020
Netgear under fire after TLS certificates found in firmware -- again
Security researchers revealed Netgear firmware exposed TLS certificate keys, but SearchSecurity discovered it wasn't the first time the issue had been reported to the vendor. Continue Reading
By- Alexander Culafi, Senior News Writer
-
Tip
23 Dec 2019
The top network security trends, threats and strategies in 2020
Ransomware and attacks against cloud providers reflect key network security trends in 2020. To combat these threats preemptively, assess your specific network needs. Continue Reading
By- Kevin Beaver, Principle Logic, LLC
-
Tip
17 Dec 2019
Perimeterless security still has borders -- and APIs need it
Many people believe perimeterless security means borders are a thing of the past. But virtual borders secure APIs needed by mobile users and cloud workloads. Check out how to manage them. Continue Reading
By- Tom Nolle, Andover Intel
-
Tip
03 Dec 2019
Network security design best practices and principles: Keep it simple
Comprehensive network security design means understanding the components that constitute your network and how and when everything is managed. Continue Reading
By- Kevin Beaver, Principle Logic, LLC
-
Answer
25 Nov 2019
The network security tools to combat modern threats
Incorporating new network security tools and methods into your enterprise's infosec program may mean the difference between staying safe or falling victim to an attack. Continue Reading
By- Andrew Froehlich, West Gate Networks
-
Opinion
20 Nov 2019
What's the answer for 5G security?
Learn about the planning of 3GPP in developing specifications for 5G security in this synopsis of 5G Americas' white paper, 'The Evolution of Security in 5G.' Continue Reading
-
Tip
19 Nov 2019
Boost network security visibility with these 4 technologies
The network is where it's at if you want to stop malicious actors. But first you need to up your network visibility. Learn about four technologies that can help. Continue Reading
By- Andrew Froehlich, West Gate Networks
-
Tip
19 Nov 2019
Network visibility and monitoring tools now amp up security
Three technology trends are currently making network visibility even more central to security tools. Learn more about the impact of big data, AI and APIs. Continue Reading
By- Andrew Froehlich, West Gate Networks
-
Tip
19 Nov 2019
Why Secure Access Service Edge is the future of SD-WAN
Secure Access Service Edge -- or SASE -- architecture transitions from network designs that revolve around the data center to a model based on identity and user context. Continue Reading
By- Steve Garson, SD-WAN Experts
-
Tip
18 Nov 2019
Use network traffic analysis to detect next-gen threats
Network traffic analysis, network detection and response -- whichever term you prefer, the technology is critical to detecting new breeds of low-and-slow threats. Continue Reading
By- Kevin Tolly, The Tolly Group
-
Tip
15 Nov 2019
The top 10 network security best practices to implement today
Even as security techniques improve, attackers are becoming more adept. Learn about 10 network security best practices and how they can keep your network secure. Continue Reading
By- Amy Larsen DeCarlo, GlobalData
-
Tip
12 Nov 2019
A fresh look at enterprise firewall management
Enterprises need to know where and how to install firewalls for maximum protection. Find out firewall management best practices that can help protect your organization. Continue Reading
By- Tom Nolle, Andover Intel
-
Tip
08 Nov 2019
After a data breach occurs, follow this network security checklist
Before a network breach occurs, you should already have a response plan in place. To make sure you're taking a proactive approach, follow this network security checklist. Continue Reading
By- Kevin Tolly, The Tolly Group
-
Feature
07 Nov 2019
Creating and managing a zero-trust security framework
IEEE senior member Kevin Curran outlines how enterprises should introduce a zero-trust security framework and discusses implementation challenges they are likely to face. Continue Reading
By- Sharon Shea, Executive Editor
-
Answer
06 Nov 2019
Network security vs. application security: What's the difference?
Different tools protect different assets at the network and application layers. But both network and application security need to support the larger security plan. Continue Reading
By- Kevin Beaver, Principle Logic, LLC
-
Tip
04 Nov 2019
Build an effective SD-WAN security strategy at the branch
Don't deploy SD-WAN without a solid network security strategy. IT teams should address four specific areas to ensure adequate security and protection against network threats. Continue Reading
By- Lee Doyle, Doyle Research
- Charles Kolodgy, Security Mindsets
-
Tip
01 Nov 2019
Increase security visibility with network automation tasks
IT teams can set up automation tasks that generate security reports about network traffic data. These read-only dashboards are useful for executives that ask for system updates. Continue Reading
By- Samuel Bickham, NetCraftsmen
- Terry Slattery, NetCraftsmen
-
Tip
15 Oct 2019
5 steps to follow in a network security audit checklist
Planning, execution, analysis, reporting and follow-up are the basic elements of a network security audit checklist. But coordination among IT teams is also important. Continue Reading
By- Kevin Beaver, Principle Logic, LLC
-
Tip
14 Oct 2019
Top 3 network security threats and how to protect against them
Enterprise networks are seemingly always under attack. Learn about the most common network security threats and what protections you should have in place. Continue Reading
By- Amy Larsen DeCarlo, GlobalData
-
Feature
09 Oct 2019
Security, business agility kindle network automation adoption
IT teams are confused by the multiple automation strategies available, but they're still adopting automation with hopes it will benefit network security and agility. Continue Reading
By- Jennifer English, Executive Editor
-
Tip
09 Oct 2019
How to develop and implement a network security plan
When formulating a focused network security plan, you'll need to address specific questions about outbound traffic, user logins and government regulations. Continue Reading
By- Kevin Tolly, The Tolly Group
-
Tip
07 Oct 2019
Data center transformation drives the ADC security use case
Application delivery controllers play many roles, but the ADC security use case might be most important. Learn about ADC features and how they boost data center security. Continue Reading
By- Lee Doyle, Doyle Research
-
Tip
04 Oct 2019
Virtual network security measures to thwart access threats
Virtual networks add a layer of complexity to the real networks below them. Follow these three virtual network security measures to prevent complexity from creating issues. Continue Reading
By- Tom Nolle, Andover Intel
-
News
04 Oct 2019
Vendors lining up behind SASE for cloud security
SD-WAN and network security vendors tailor their portfolios to deliver SASE, a cloud security architecture for the age of SaaS, public clouds and IoT. Continue Reading
By- Antone Gonsalves, News Director
-
Tip
02 Oct 2019
How can DNS privacy issues be addressed?
Learn two techniques for improving end-user DNS privacy protection that prevent DNS from exposing information about websites users visit and the people users communicate with. Continue Reading
By- Fernando Gont, SI6 Networks
-
Tip
02 Oct 2019
Automation improves firewall migration and network security
Firewall migration is a compelling automation use case, as automation scripts can shorten the migration process, eliminate unused rules and bolster overall network security. Continue Reading
By- Samuel Bickham, NetCraftsmen
- Terry Slattery, NetCraftsmen
-
Answer
25 Sep 2019
Do network layer and application layer DDoS attacks differ?
Network layer and application layer DDoS attacks are significant threats. Learn about the differences between them and what you can do to reduce their effects. Continue Reading
By- Andrew Froehlich, West Gate Networks
-
Tip
23 Sep 2019
How software-defined perimeter authentication ups security
Find out how the emerging software-defined perimeter model increases security by its design and how it can serve as a building block to zero-trust security. Continue Reading
By- Johna Till Johnson, Nemertes Research
-
Tip
19 Sep 2019
Cybersecurity frameworks hold key to solid security strategy
Cybersecurity frameworks take work, but they help organizations clarify their security strategies. If you don't have one, here's what to consider, even for emerging perimeterless security options. Continue Reading
By- Tom Nolle, Andover Intel
-
Answer
11 Sep 2019
How does 802.11ax security benefit from WPA3?
Security methods like WPA3 and Opportunistic Wireless Encryption will give a boost to 802.11ax security, but securing the new wireless standard is still pretty complicated. Continue Reading
By -
Tip
03 Sep 2019
How client VPN technologies will evolve with AI and automation
With help from artificial intelligence and automation, client VPN technologies could innovate the way they handle data flows within hybrid cloud environments. Continue Reading
By- Andrew Froehlich, West Gate Networks
-
Tip
29 Aug 2019
How SD-WAN security can boost your network security strategy
Many organizations say security is a top priority for their business, but most lack the necessary resources to thoroughly secure their networks and cloud services. SD-WAN could help. Continue Reading
By- Michaela Goss, Senior Site Editor
-
Quiz
19 Aug 2019
What are network firewalls? Test your network security IQ
Network firewalls have been an essential part of network security since the internet began. This quiz covers what network firewalls are and tests your security expertise. Continue Reading
By- Michaela Goss, Senior Site Editor
-
Answer
14 Aug 2019
What are the top 3 network analytics use cases?
Network analytics use cases illustrate some of the benefits that companies are receiving from network analysis tools. Gauging network performance is just one key area. Continue Reading
By- Amy Larsen DeCarlo, GlobalData
-
Tip
08 Aug 2019
Understanding AWS security groups' capabilities and limitations
Expand your knowledge of AWS security groups. Learn how to configure them for traffic protection, along with how they compare to other firewall options on AWS. Continue Reading
By- Ofir Nachmani, I am OnDemand
-
News
02 Aug 2019
Cisco security flaw leads to $8.6M payout in whistleblower case
The settlement resolves allegations that a Cisco security flaw left governments vulnerable to hackers for years without the company taking action. Continue Reading
-
Tip
29 Jul 2019
SD-WAN security benefits go beyond the obvious
SD-WAN does more than extend corporate networks. Key SD-WAN security benefits that capitalize on the technique's architecture could change the face of SD-WAN in the enterprise. Continue Reading
By- Tom Nolle, Andover Intel
-
Answer
29 Jul 2019
How can network security analytics detect and thwart threats?
Network security analytics gives organizations an additional level of protection against malicious attacks. It works closely with network analytics tools. Continue Reading
By- Amy Larsen DeCarlo, GlobalData
-
Feature
24 Jul 2019
Network teams spend more time than ever on network security issues
The workloads of network teams have evolved from their original objectives because of network security threats. Yet teams are still expected to maintain their initial goals. Continue Reading
By- Michaela Goss, Senior Site Editor
-
News
23 Jul 2019
Niagara Networks and L7 Defense team up for API security
The L7 Defense application Ammune API Defense will run on Niagara Networks' Open Visibility Platform in an effort to bring security to API communications. Continue Reading
-
Feature
18 Jul 2019
Why did operator NFV adoption lag so much?
NFV adoption was hampered by high costs and deployment issues, according to one industry insider. Also, learn about the latest on network security and industry hype. Continue Reading
By- Chuck Moozakis, Editor at Large
-
Feature
17 Jul 2019
The 5 network security basics you need to know
In this compilation, learn what network security is, as well as how it differs from cybersecurity, common -- and potentially confusing -- technologies, threats and more. Continue Reading
By- Michaela Goss, Senior Site Editor
-
Answer
11 Jul 2019
What does stateful vs. stateless mean in a networking context?
When it comes to understanding state from a networking perspective, knowing the difference between stateful vs. stateless firewalls is a crucial starting point. Continue Reading
By- Andrew Froehlich, West Gate Networks
-
Opinion
08 Jul 2019
Who's to blame for ransomware attacks -- beyond the attackers?
Cyberattackers are to blame for ransomware attacks, but what about companies that release flawed software or don't install patches? Our expert looks at where the buck stops. Continue Reading
By- Kevin McDonald, Alvaka Networks
-
Feature
02 Jul 2019
A glossary of 10 essential network security terms
This network security glossary covers both old and new key terms -- such as zero trust networks and microsegmentation -- that can bolster anyone's security vocabulary. Continue Reading
By- Michaela Goss, Senior Site Editor
-
Guide
28 Jun 2019
How to improve network visibility and regain control
Gaining visibility into the network has never been easy; technology like cloud and IoT makes it even tougher. Learn how to meet such challenges and keep network traffic flowing. Continue Reading
By- Brenda L. Horrigan, Executive Managing Editor
-
News
27 Jun 2019
Pica8 PicOS upgrade enhances network security
Pica8 claims its PicOS network operating system will address rising security and efficiency challenges with its new network access control integrations. Continue Reading
By- Sabrina Polin, Managing Editor
-
Feature
26 Jun 2019
What networking analysts are saying about Cisco's future
Has Cisco outgrown networking? One industry insider seems to think so. Plus, other analysts size up Cisco's future around security and intent-based networking. Continue Reading
By- Luke O'Neill, Executive Editor
-
News
24 Jun 2019
Aviatrix adds next-gen firewalls to cloud services
The Palo Alto Networks VM-Series next-generation firewalls are now deployed as part of Aviatrix's Firewall Network Service -- an extension of the Multi-Cloud Backbone portfolio. Continue Reading
-
News
18 Jun 2019
DH2i's DxConnect brings zero-trust connectivity to networks
DH2i's zero-trust architecture software, DxConnect, will address common security issues and bring microtunnel development, discreet invisibility, an open API and more. Continue Reading
By- Sabrina Polin, Managing Editor
-
Tip
17 Jun 2019
The role of edge computing security in enterprise networks
By ensuring IoT security, IT teams can secure enterprise networks as well. Edge computing can provide one path toward this security, as long as IT properly evaluates and plans for it. Continue Reading
By- John Burke, Nemertes Research
-
News
12 Jun 2019
Ixia network packet broker, cybersecurity test introduced
Ixia launched two new products for networking and security: the Ixia network packet broker, Vision X, for data center visibility and Ixia BreakingPoint QuickTest to gauge device and network security. Continue Reading
By- Sabrina Polin, Managing Editor
-
News
11 Jun 2019
CEO Robbins: Cisco won't use Huawei ban in sales pitch
CEO Chuck Robbins said Cisco won't use the U.S. ban on Huawei exports in sales pitches. Robbins also said the Huawei ban has not had an effect on sales. Continue Reading
By- Antone Gonsalves, News Director
-
News
07 Jun 2019
Sentryo acquisition to bolster Cisco IIoT security
Cisco plans to acquire industrial security firm Sentryo. The acquisition would add network visibility, anomaly detection and real-time threat detection to the Cisco IIoT portfolio. Continue Reading
By- Antone Gonsalves, News Director
-
News
24 May 2019
Cisco vulnerability fix for thrangrycat carries risks
The Cisco vulnerability fix for thrangrycat could make affected hardware unusable. But the vendor said its ready to replace products, if needed. Continue Reading
By- Antone Gonsalves, News Director
-
Podcast
22 May 2019
Risk & Repeat: Cisco vulnerabilities raise backdoor concerns
This week's Risk & Repeat podcast looks at vulnerabilities in Cisco and Huawei products, which have raised concerns about backdoor access in networking equipment. Continue Reading
By- Rob Wright, Senior News Director
-
News
20 May 2019
Marconi Mainnet launched for building, scaling complex networks
The Marconi Mainnet platform provides blockchain security, multi-cloud connectivity, advanced firewalls and secure gateways for decentralized networks. Continue Reading
By- Sabrina Polin, Managing Editor
-
News
15 May 2019
Extreme launches autonomous network strategy at Extreme Connect
Extreme unveils its building blocks for an autonomous network, called Elements. The company also introduces at the Extreme Connect show an IoT security tool. Continue Reading
By- Antone Gonsalves, News Director
-
Feature
13 May 2019
DDoS attacks among top 5G security concerns
DDoS attacks top the list of primary security concerns for mobile operators now that 5G wireless is advancing as the number of connected devices grows. Continue Reading
By- Madelyn Bacon, TechTarget
-
News
10 May 2019
Cisco AMP for Networks bolsters SD-WAN security
Cisco AMP for Networks is now part of the company's SD-WAN product. Cisco also announced this week that it had open sourced its MindMeld AI development platform. Continue Reading
By- Antone Gonsalves, News Director
-
Answer
08 May 2019
What is network traffic analytics and how does it enhance security?
Network traffic analysis has evolved to incorporate machine learning techniques that help identify network security threats in real time and expedite a response. Continue Reading
By- Amy Larsen DeCarlo, GlobalData
-
News
06 May 2019
Cisco SSH vulnerability sparks debate over backdoors
Cisco released a patch for a critical vulnerability in Nexus 9000 switches that could allow a remote attacker to gain root access because of the use of a default SSH key pair. Continue Reading
By- Michael Heller, TechTarget
-
Answer
24 Apr 2019
What are the 5 types of network firewalls and how are they different?
As they monitor and filter network traffic, some firewalls can provide some pretty advanced security controls. But added packet inspection can slow network performance. Continue Reading
By- Amy Larsen DeCarlo, GlobalData
-
Tip
23 Apr 2019
How to build a strong cloud network security strategy
Building a secure network in the cloud is different from securing a traditional network. Learn what the main differences are and how to establish cloud networking security. Continue Reading
By- Dave Shackleford, Voodoo Security
-
Tip
23 Apr 2019
The future of VPN will reflect the need for flexibility
The future of VPN services reflects the industry's trend toward software networking, evident in developments like SD-WAN and public cloud. The need for flexible technology is a main driver. Continue Reading
By- Robert Sturt, Netify
-
Tip
28 Mar 2019
4 steps to ensure virtual machine security in cloud computing
Enterprises are now operating in a cloud-virtual world. Understanding four steps to ensure virtual machine security in cloud computing environments is crucial. Continue Reading
By- Tom Nolle, Andover Intel
-
Tip
27 Mar 2019
How to secure network devices in a hostile world
Find out how to secure network devices by locking down the biggest, riskiest holes to protect them from exploits long before some or all of the network crashes. Continue Reading
By- Tom Nolle, Andover Intel
-
Feature
26 Mar 2019
Zero-trust security model primer: What, why and how
What exactly is a zero-trust security model? This primer explains the basics about the philosophy behind how designing a security architecture strictly limits access to all, not just outsiders. Continue Reading
-
Answer
22 Mar 2019
What tools can reinforce network edge security?
Firewalls, intrusion prevention systems and cloud-based threat intelligence are just a few of the many ways that organizations can bolster network edge security. Continue Reading
By- Andrew Froehlich, West Gate Networks
-
Answer
18 Mar 2019
What does a zero-trust model mean for network security?
A zero-trust model limits access and permissions according to a defined set of parameters that enterprises specify for each application. Learn what this means for network security. Continue Reading
By -
News
08 Mar 2019
Battling misinformation focus of Facebook, Twitter execs' talk
Facebook and Twitter executives say finding a pattern of malicious activity is more effective in identifying bad actors on sites than looking at the misleading information itself. Continue Reading
By- Antone Gonsalves, News Director
-
News
07 Mar 2019
Microsoft promotes zero-trust security over firewalls
Microsoft told RSA Conference attendees a zero-trust model is better than firewalls for protecting corporate data -- a stance that some said doesn't go far enough. Continue Reading
By- Antone Gonsalves, News Director
-
News
06 Mar 2019
Cisco: Network security strategy requires IT, OT to play nice
Cisco told RSA attendees the need for network security on the factory floor is growing. Cisco says cooperation between IT and operations is key to protecting equipment. Continue Reading
By- Antone Gonsalves, News Director
-
Answer
25 Feb 2019
How does security for intent-based networking work?
Monitoring plays an essential role when it comes to security in intent-based networking environments, as it ensures policies are met and detects network anomalies. Continue Reading
By- David Jacobs, The Jacobs Group
-
Tip
25 Feb 2019
How to improve network security in 5 steps
The basics of network security start with a proactive and comprehensive audit of connectivity points. Also, be sure to get end users involved with network security policies. Continue Reading
By- Amy Larsen DeCarlo, GlobalData
-
Answer
11 Feb 2019
What are the pros and cons of machine learning in network security?
The predictive nature of machine learning can benefit network security strategies. But it can also benefit those looking to break through secure network barriers. Continue Reading
By- David Jacobs, The Jacobs Group
-
Tip
01 Feb 2019
Have newer security methods made NAC systems obsolete?
While newer security methods, like microsegmentation and software-defined perimeter, diminish the role of network access control, NAC systems can still help secure the network edge. Continue Reading
By- David Jacobs, The Jacobs Group
-
Answer
10 Jan 2019
What is a software-defined perimeter, and do I need it?
An evolving network world requires evolving network security. Learn how software-defined perimeter offers a compelling answer to network vulnerabilities. Continue Reading
By- Lee Doyle, Doyle Research
-
Tip
03 Jan 2019
Network security, SD-WAN suppliers revamp branch security
Branch network security is getting a face-lift, as network security and SD-WAN suppliers look at new ways to integrate their platforms and upgrade products. Continue Reading
By- Lee Doyle, Doyle Research
-
Answer
31 Dec 2018
Which KPIs should I measure for security in SDN?
KPIs provide useful guidelines to measure how network performance and security align with business objectives. Here are some KPIs to help keep track of an SDN environment. Continue Reading
By- John Burke, Nemertes Research
-
Answer
26 Dec 2018
How might NFV in IoT enhance network edge security?
The emergence of IoT devices has considerable network security implications. An NFV architecture, however, could add another layer of network defense. Continue Reading
By -
News
05 Dec 2018
Juniper ATP appliance gets broader device support
Juniper has bolstered the security features in its Advanced Threat Prevention product. The vendor also released a Juniper ATP appliance for midsize enterprises. Continue Reading
By- Antone Gonsalves, News Director
-
Answer
04 Dec 2018
What are the differences between network security vs. cybersecurity?
IT groups need to consider varying layers of security. For instance, the similarities and differences between cybersecurity and network security are closely entwined. Continue Reading
By- Mike Jude, Stratecast/Frost & Sullivan
-
Answer
16 Nov 2018
What are today's top 3 network security challenges?
A significant shortage of cybersecurity staff, poorly configured firewalls and unmanaged end-user mobile devices are some of the top network security threats. Continue Reading
By- Amy Larsen DeCarlo, GlobalData
-
Feature
16 Nov 2018
A quick guide to important SDN security issues
Lock down your knowledge of SDN security issues using this compilation that includes expert advice, common pain points and helpful best practices. Continue Reading
By- Jennifer English, Executive Editor
-
Tip
09 Nov 2018
NetOps, SecOps, DevOps concepts merge to automate security testing
By adopting DevOps concepts, network teams can automate security testing. But, as development, network and security tasks mingle, some staffing challenges can arise. Continue Reading
By- John Burke, Nemertes Research