Pro+ Content/Information Security magazine

Thank you for joining!
Access your Pro+ Content below.
July/August 2013 / Volume 15 / No. 6

Unlock new pathways to network security architecture

Network security architecture is showing its age at many organizations. With new technology, different data types, and use of multi-generations of applications at an all-time high; security teams are looking at new and different ways to isolate, monitor, and control traffic within their data centers and extended networks. How can your organization make the right network security architecture decisions when it comes to network isolation and segmentation to create a multi-layer attack surface? Consolidation of feature sets into unified platforms, and collapsed architectures at the perimeter are just some of the network security architecture strategies that enterprises have adopted. We also publish the results of our Enterprise Mobile Security 2013 survey this month and offer expert advice on third-party vendor risk management.

Features in this issue

  • Enterprise mobile security by the numbers

    by  Kathleen Richards, Features Editor

    Almost 60% of respondents in our 2013 Enterprise Mobile Security Survey believe mobile devices present more risk now than in Q2 2012. What’s changed?

Columns in this issue

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

-ADS BY GOOGLE

Close