Network Security: Tools, Products, Software News
February 17, 2015
In comparing UTM vs. NGFW, organizations find it difficult to see if there are differences between the two products or if it is just marketing semantics.
February 12, 2015
A new report from FireMon finds that firewalls are still a critical security component, but firewall policy management is a major pain point for admins.
November 01, 2014
More than 1,700 voters weighed in and helped us award this year's top security technologies in 22 categories.
October 29, 2014
Customers and partners like the new effort by the Intel-owned security vendor to integrate threat intelligence feeds with all of its existing products, but analysts are leery of lacking threat intelligence standards.
Network Security: Tools, Products, Software Get Started
Bring yourself up to speed with our introductory content
Security information and event management (SIEM) is an approach to security management that seeks to provide a holistic view of organization’s information technology (IT) security. Continue Reading
Air gapping is a security measure that involves removing a computer or network from any externally connected network physically and also ensuring there is also no wireless connection. The NSA TEMPEST project provides recommendations for air-gapping... Continue Reading
This section of our Eye On IT Security Series examines the latest in network security appliances, including the latest features finding their way into intrusion prevention and intrusion detection systems, unified threat management, and network ... Continue Reading
Evaluate Network Security: Tools, Products, Software Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
The influx of BYOD and Internet of Things (IoT) devices into the workplace is calling for proper device onboarding processes. Expert Kevin Beaver offers helpful hints. Continue Reading
The votes are tallied. The winners of Information Security magazine's Security Readers' Choice Awards 2014 are announced in this issue. We congratulate all of the winners in 22 product categories. This year several newcomers earned top scores... Continue Reading
Matthew Pascucci offers an intro to software-defined networking and explains why SDN security relies on securing the SDN controller at all costs. Continue Reading
Product ReviewsPowered by IT Central Station
Cost effective but when we originally purchased LANGuardian, some features needed further development.Powered by IT Central Station
Valuable Features: The ability to detect and decipher torrent traffic for the purpose of identifying what some refer to as "copyright violators"....Continue Reading
Powered by IT Central Station
Valuable Features: Provides a detailed view of internet bandwidth consumption. • Improvements to My Organization: We can track users who...Continue Reading
Delivers higher frequency of scans & better aggregation of results. Ticket management has room for improvement.Powered by IT Central Station
Valuable Features: Integrity of scanners; never do I need to worry….“Is this scanner going to bring down a host?”. • Improvements to My...Continue Reading
Manage Network Security: Tools, Products, Software
Learn to apply best practices and optimize your operations.
Considering a next-generation firewall? The latest features will facilitate design and architecture changes in your data center environment. Continue Reading
Under new leadership, the networking giant's security group relaunched Cisco SecureX with several new products, including an application-aware firewall. Continue Reading
Problem Solve Network Security: Tools, Products, Software Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
John Burke offers advice on effectively deploying network security devices to protect sensitive data and manage the mobility boom in the enterprise. Continue Reading
Don't risk making mistakes when you evaluate network security virtualization products. Our six key points will keep you on track. Continue Reading
Targeted attacks can be stopped with a defense-in-depth strategy. Michael Cobb explains how to implement a targeted attack prevention plan. Continue Reading