Access your Pro+ Content below.
Insider Edition: Beyond 'next gen': Putting a 21st century security strategy in place
When it comes to having a 21st century security strategy, new thinking is critical. The network perimeter is essentially dead, but there are still plenty of firewalls guarding enterprise IT at crucial points. But it's time to stop hiding behind the "Next Gen" nomenclature and figure out what technology is really new and what you should be considering adding to your defense posture in order to achieve actual 21st century security in your enterprise.
This Insider Edition of Information Security magazine examines what is actually new and useful in the realm of devices that protect traffic passing from one network to another. The increase in rule complexity and statefulness at the perimeter also begs the question of where these devices blur into the world of network analytics systems that are specifically aimed at advanced threats on the wire. What, in short, is the optimal deployment for stopping as much trouble as you can before it hits valued network-connected assets?
Access this PRO+ Content for Free!
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Features in this issue
Protecting your security perimeter is getting harder, as the threats get more sophisticated and the perimeter harder to identify. But these eight bellwether technologies can help.
Security professionals break old boundaries with new network edge protection strategies.
Without a trace: Cybersecurity incident response teams must follow the thread of security events through volumes of log data from increasingly diverse sources.