November 03, 2015
The first hurdle of hybrid cloud migration is tricky enough -- then the rest of the hybrid cloud picture comes into focus.
November 02, 2015
Software-defined networking (SDN) gained early traction with the companies that had the resources to deploy it and a clear, immediate need for its benefits: cloud providers, carriers and hyper-scale data center operators. They were eager to use SDN to make their networks more flexible, programmable and scalable. More importantly, they were willing to accept the possible hazards that come along with adopting a radically different network architecture.
It was expected that SDN would soon trickle down to the enterprise. Yet even after several years, it turns out we're still in the early days, and many enterprises are not yet ready (or willing) to use SDN in their networks.
It's time to look at realistic SDN use cases and deployment models for mainstream enterprises -- not just companies like Amazon and Google. In this issue of Network Evolution, learn more about how enterprises are likely to use SDN and if it will ever become the new normal in networking.
Also in this issue, we explore what lessons network engineers can take away from the spate of high-profile network outages that affected companies such as United Airlines and the New York Stock Exchange earlier this year. Learn more about what's likely to take down your network and what steps enterprises can take to avoid it.
Additionally, network engineers weigh in on the growing pressure to improve their fluency in security in light of the ongoing wave of data breaches and how it's affected their jobs.
October 19, 2015
We may have outlived the era of killer apps in some part defined by Walmart, but Hadoop big data applications may help the giant's quest for more growth.
October 14, 2015
Windows 10 security incorporates years of improvements to remove or mitigate long-term issues with Windows vulnerabilities.
Firewalls Get Started
Bring yourself up to speed with our introductory content
Learn how the perimeter-based architecture failure, a professional threat economy and greater hacking penalties are driving the need for a next-generation security architecture. Continue Reading
VMware's NSX network virtualization offering can add another layer of protection by isolating various elements in the vSphere infrastructure. Continue Reading
Threat intelligence takes data from multiple sources and turns it into actionable, contextual information. Expert Ed Tittel takes a look at the top threat intelligence services. Continue Reading
Evaluate Firewalls Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Following the lead of hyperscale providers like Google and Amazon, IT managers employ software-defined network controllers to meet the requirements of monolithic applications. Continue Reading
Visibility into what is happening on your network may matter more than stopping an attack. Can technology keep up with advanced threats? Continue Reading
The Adtran VoIP lineup, consisting of the NetVanta 7100 and 7060 IP PBX products, supports a wide range of features, including routing, switching and stateful firewall. Continue Reading
Learn to apply best practices and optimize your operations.
In this Q&A, a network engineer at the Rochester Institute of Technology explains his favorite weapons against network threats: user education and vulnerability scanning. Continue Reading
Network engineers who have focused primarily on honing their routing and switching skills say having limited network security training is no longer adequate. Continue Reading
As the need for a dedicated information security officer catches fire beyond firewalls, how should companies engineer the expanding CISO role? Continue Reading
Problem Solve Firewalls Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
As assets are moved to the cloud, organizations must take steps to ensure that cloud compliance requirements are upheld by third-party vendors. This is a major undertaking that requires knowledge of federal, state and international law; changing regulations; cloud security; and non-traditional information security controls and best practices. In this issue of Information Security magazine, we look at the shared responsibility model between organizations and service providers to protect data in the cloud.
Many companies have elevated the visibility of the CISO function in response to a series of high-profile breaches. Some organizations are hiring fulltime CISOs for the first time. Others are shoring up their ranks. At mature organizations, it is not unusual to have board-level discussions about cyber-risk oversight, with concerns ranging from assets at risk, to information security responsibility and reporting structures. As the CISO position continues to be defined, we look at the role beyond IT.
Investments in cybersecurity startups are taking off. Driven by CEO and board-level demand for promising technology aimed at protecting corporate networks and sensitive data, investors are pouring money into cybersecurity companies. While most investments are aimed at turning a profit for venture-capital firms, some companies are investing to reap the benefits of working with new technology and influence product development. We look at strategic partnerships and how funding startups can pay off. Continue Reading
Just because the dashboard in your network monitoring software shows that everything is functional doesn't guarantee it's functioning well for users. Continue Reading
Something as small as a flash drive can be a danger to your virtual machines and the data inside them. Make sure to keep your info secure. Continue Reading