New & Notable
Network Security: Tools, Products, Software News
August 08, 2014
At Black Hat 2014, Yahoo CISO Alex Stamos decried enterprise security companies' inability to handle scale and system diversity, and called on vendors to seize the opportunity for innovation.
February 28, 2012
Under new leadership, the networking giant's security group relaunched Cisco SecureX with several new products, including an application-aware firewall.
February 14, 2011
Lumension announced the Endpoint Intelligence Center to protect endpoint computers from threats, malware and third-party software vulnerabilities.
Network Security: Tools, Products, Software Get Started
Bring yourself up to speed with our introductory content
Air gapping is a security measure that involves removing a computer or network from any externally connected network physically and also ensuring there is also no wireless connection. The NSA TEMPEST project provides recommendations for air-gapping... Continue Reading
Security information and event management (SIEM) is an approach to security management that seeks to provide a holistic view of organization’s information technology (IT) security. Continue Reading
Evaluate Network Security: Tools, Products, Software Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Matthew Pascucci offers an intro to software-defined networking and explains why SDN security relies on securing the SDN controller at all costs. Continue Reading
Manage Network Security: Tools, Products, Software
Learn to apply best practices and optimize your operations.
Considering a next-generation firewall? The latest features will facilitate design and architecture changes in your data center environment. Continue Reading
Problem Solve Network Security: Tools, Products, Software Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
John Burke offers advice on effectively deploying network security devices to protect sensitive data and manage the mobility boom in the enterprise. Continue Reading
Don't risk making mistakes when you evaluate network security virtualization products. Our six key points will keep you on track. Continue Reading
Targeted attacks can be stopped with a defense-in-depth strategy. Michael Cobb explains how to implement a targeted attack prevention plan. Continue Reading