New & Notable
Network Security: Tools, Products, Software News
November 01, 2014
More than 1,700 voters weighed in and helped us award this year's top security technologies in 22 categories.
October 29, 2014
Customers and partners like the new effort by the Intel-owned security vendor to integrate threat intelligence feeds with all of its existing products, but analysts are leery of lacking threat intelligence standards.
August 08, 2014
At Black Hat 2014, Yahoo CISO Alex Stamos decried enterprise security companies' inability to handle scale and system diversity, and called on vendors to seize the opportunity for innovation.
February 28, 2012
Under new leadership, the networking giant's security group relaunched Cisco SecureX with several new products, including an application-aware firewall.
Network Security: Tools, Products, Software Get Started
Bring yourself up to speed with our introductory content
Air gapping is a security measure that involves removing a computer or network from any externally connected network physically and also ensuring there is also no wireless connection. The NSA TEMPEST project provides recommendations for air-gapping... Continue Reading
Security information and event management (SIEM) is an approach to security management that seeks to provide a holistic view of organization’s information technology (IT) security. Continue Reading
This section of our Eye On IT Security Series examines the latest in network security appliances, including the latest features finding their way into intrusion prevention and intrusion detection systems, unified threat management, and network ... Continue Reading
Evaluate Network Security: Tools, Products, Software Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
The votes are tallied. The winners of Information Security magazine's Security Readers' Choice Awards 2014 are announced in this issue. We congratulate all of the winners in 22 product categories. This year several newcomers earned top scores... Continue Reading
Matthew Pascucci offers an intro to software-defined networking and explains why SDN security relies on securing the SDN controller at all costs. Continue Reading
Product ReviewsPowered by IT Central Station
Powered by IT Central Station
Valuable Features: Provides a detailed view of internet bandwidth consumption. Improvements To Organization: We can track users who misuse...Continue Reading
Delivers higher frequency of scans & better aggregation of results. Ticket management has room for improvement.Powered by IT Central Station
Valuable Features: Integrity of scanners; never do I need to worry….“Is this scanner going to bring down a host?”. Improvements To Organization:...Continue Reading
Powered by IT Central Station
Valuable Features: The live packet capture feature Improvements To Organization: Quicker troubleshooting and better network...Continue Reading
Manage Network Security: Tools, Products, Software
Learn to apply best practices and optimize your operations.
Considering a next-generation firewall? The latest features will facilitate design and architecture changes in your data center environment. Continue Reading
Problem Solve Network Security: Tools, Products, Software Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
John Burke offers advice on effectively deploying network security devices to protect sensitive data and manage the mobility boom in the enterprise. Continue Reading
Don't risk making mistakes when you evaluate network security virtualization products. Our six key points will keep you on track. Continue Reading
Targeted attacks can be stopped with a defense-in-depth strategy. Michael Cobb explains how to implement a targeted attack prevention plan. Continue Reading