Access your Pro+ Content below.
Unlock new pathways to network security architecture
This article is part of the Information Security magazine issue of July/August 2013 / Volume 15 / No. 6
In an interesting paradox, enterprise networks have experienced unprecedented sprawl and significant consolidation over the past 10 years. With new technology and application use at an all-time high, security teams require different ways to isolate, monitor and control traffic within their data centers and extended networks. What network isolation and segmentation techniques are many companies now considering? How can consolidation and collapse of feature sets into unified platforms, and more condensed network security architecture at the perimeter secure sensitive data and corporate assets? While security isn’t the primary driver of major network architecture overhauls, new threats are leading more organizations to re-architect portions of their networks. For some large organizations, the continued rise of devastating distributed denial-of-service (DDoS) attacks, embedded HTTPS control channels, and sophisticated malware may necessitate a redesign focused on network security architecture. Business growth or operational changes ...
Access this PRO+ Content for Free!
Features in this issue
In this special report, Dave Shackleford explores advanced network security architectures that help segment and isolate traffic with in your data center.
Cover story: Want to shed appliances? Consolidation and new platforms hold promise for security teams.
The majority of breaches occur as the result of third parties. MacDonnell Ulsch advises companies to safeguard third-party management agreements.
Almost 60% of respondents in our 2013 Enterprise Mobile Security Survey believe mobile devices present more risk now than in Q2 2012. What’s changed?
Columns in this issue
We polled readers in our annual Enterprise Mobile Security Survey and the 2013 results are in.
A decade after becoming law, the ripple effects of California's SB 1386 have surfaced in a new breed of proactive, granular state data privacy laws.
Big data presents big challenges for computer science programs from classification to cloud security. Are industry partnerships the answer?