Pro+ Content/Information Security magazine

Thank you for joining!
Access your Pro+ Content below.
July/August 2013 / Volume 15 / No. 6

Unlock new pathways to network security architecture

In an interesting paradox, enterprise networks have experienced unprecedented sprawl and significant consolidation over the past 10 years. With new technology and application use at an all-time high, security teams require different ways to isolate, monitor and control traffic within their data centers and extended networks. What network isolation and segmentation techniques are many companies now considering? How can consolidation and collapse of feature sets into unified platforms, and more condensed network security architecture at the perimeter secure sensitive data and corporate assets? While security isn’t the primary driver of major network architecture overhauls, new threats are leading more organizations to re-architect portions of their networks. For some large organizations, the continued rise of devastating distributed denial-of-service (DDoS) attacks, embedded HTTPS control channels, and sophisticated malware may necessitate a redesign focused on network security architecture. Business growth or operational changes ...

Features in this issue

  • Enterprise mobile security by the numbers

    by  Kathleen Richards, Features Editor

    Almost 60% of respondents in our 2013 Enterprise Mobile Security Survey believe mobile devices present more risk now than in Q2 2012. What’s changed?

Columns in this issue

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

-ADS BY GOOGLE

Close