June 16, 2015
Silver Peak has released an appliance that lowers networking costs by providing more traffic control in a hybrid WAN.
February 11, 2015
Pure Storage launched the FlashArray 450 as the new flagship of its all-flash line and filled a feature gap by adding replication.
January 29, 2015
Brocade is promoting router encryption in the release of its MLXe security module, but expert opinions fall short of unanimous endorsement.
October 21, 2014
Connected Data's Transporter evolves from a SOHO device to an appliance that provides IT with a private cloud for file sync-and-share.
AES Get Started
Bring yourself up to speed with our introductory content
Full disk encryption can be a key component of an enterprise's desktop and laptop security strategy. Here's a look at some of the top FDE products in the industry. Continue Reading
Android's popularity makes it a prime target for hackers and attackers. Fortunately, there are plenty of security features to keep devices safe. Continue Reading
Learn details for employing Amazon S3 encryption features. Expert Dave Shackleford compares S3 encryption to other cloud provider offerings. Continue Reading
Evaluate AES Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Google is closing the gap on Apple when it comes to mobile OS security, but Android is still more vulnerable to malware and corporate data loss than iOS. Continue Reading
Expert Karen Scarfone examines the features of Sophos SafeGuard, a full disk encryption product for laptops, desktops and servers. Continue Reading
Expert Karen Scarfone examines the features of BitLocker, Microsoft's native full disk encryption software for Windows laptops, desktops and servers. Continue Reading
Learn to apply best practices and optimize your operations.
Emerging security technology channels basic logging tools and ancient cultures as IT execs turn to old-school tech to protect precious data. Continue Reading
Is Apple iMessage encryption strong enough to mitigate reverse-engineering attacks? Learn more about one of the top iMessage security risks. Continue Reading
Enterprise laptops are easily lost, stolen or compromised, so a mobile security policy should address how they access data and enterprise networks. Continue Reading
Problem Solve AES Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Wi-Fi has revolutionized the enterprise by not only extending network coverage in a particular building or campus, but also by enabling on-the-go working, be it from a coffee shop or a hotel room. Yet, while these improvements reduce employee downtime and increase efficiency, Wi-Fi has had a significant impact on network security; many security measures of yesteryear are simply ineffective today.
Whether your enterprise has already adopted Wi-Fi or is evaluating the technology, there are several considerations to keep in mind.
In this Technical Guide, wireless security expert Lisa Phifer examines the rise in Wi-Fi popularity and explains why going beyond the basics is essential to Wi-Fi security. Then, Phifer outlines tools that can help enterprises overcome the difficult task of provisioning WLAN access to the plethora of mobile devices and platforms infiltrating the enterprise that require corporate network access. Finally, expert Brad Casey discusses the effects 802.11ac, commonly referred to as Gigabit Wi-Fi, will have on enterprise wireless network security.
As the corporate environment grows more disparate and globally divided, it will become more critical than ever to use Wi-Fi to maintain connectivity, productivity and profitability. However, without the proper security measures in place, enterprises risk falling victim to wireless intruders, having sensitive data stolen and more.
This Technical Guide offers the expertise you need to integrate Wi-Fi security into your enterprise's overarching network security strategy and maintain security in the age of wireless connectivity. Continue Reading
Will Gigabit Wi-Fi significantly alter network security, or will it mean business as usual? Expert Brad Casey discusses the new 802.11ac standard. Continue Reading
Can a secure symmetric key encryption algorithm be used in hash function cryptography? Learn more about these data encryption techniques. Continue Reading