August 23, 2016
A Cisco security vulnerability affecting routers was found in the Shadow Brokers cyberweapon dump, and it may have been used by the NSA for years to decrypt VPN traffic.
August 05, 2016
In this SDN blog roundup, one networking pro looks at a new VMware tool for managing certifications, while another assesses new NFV-based managed security services.
July 20, 2016
The latest AT&T Network on Demand service provides virtualized versions of Cisco or Juniper routers, Fortinet firewalls or Riverbed WAN optimization technology.
June 27, 2016
Managed service providers can now sell a channel-oriented firewall from Intronis MSP Solutions by Barracuda, Barracuda Networks' MSP brand.
Firewalls Get Started
Bring yourself up to speed with our introductory content
Managed service providers are reselling security as a service offerings from third-party providers to expand their service portfolios in the IT security arena. Continue Reading
Organizations should configure the local security policy for new servers to handle patch management and for protection against unauthorized access. Continue Reading
Network security groups control the lines of communication between network traffic and cloud instances. How do I set them up in AWS or Azure? Continue Reading
Evaluate Firewalls Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Before you buy video conferencing services, evaluate the components of cloud vs. on-premises video to determine which deployment model is the right fit for your organization. Continue Reading
Juniper firewall products were found to have two backdoor vulnerabilities. Expert Michael Cobb explains how a cryptographic algorithm and hardcoded password enabled this to happen. Continue Reading
VMware CEO Pat Gelsinger talked about where the security world stands, where it can go and how NSX fits in. Continue Reading
Learn to apply best practices and optimize your operations.
When it comes to having a 21st century security strategy, new thinking is critical. The network perimeter is essentially dead, but there are still plenty of firewalls guarding enterprise IT at crucial points. But it's time to stop hiding behind the "Next Gen" nomenclature and figure out what technology is really new and what you should be considering adding to your defense posture in order to achieve actual 21st century security in your enterprise.
This Insider Edition of Information Security magazine examines what is actually new and useful in the realm of devices that protect traffic passing from one network to another. The increase in rule complexity and statefulness at the perimeter also begs the question of where these devices blur into the world of network analytics systems that are specifically aimed at advanced threats on the wire. What, in short, is the optimal deployment for stopping as much trouble as you can before it hits valued network-connected assets? Continue Reading
Companies still fail to implement secure network segmentation and role-based access. Here's how to protect your sensitive data and stay out of the headlines. Continue Reading
In this SearchCIO webcast, Nemertes Research CEO Johna Till Johnson explains how CIOs should build a functional IT security roadmap. Continue Reading
Problem Solve Firewalls Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
As public and private cloud services bring new IT security demands, data center teams need to rethink how they approach firewalls, identity management and more. Continue Reading
With Comcast's acquisition of DreamWorks Animation in April, "Shrek" fans could see the fairy tale-esque story revived with more movies in the coming years, according to Forbes. In the original ... Continue Reading
Security, for a decade or so, didn't see much in the way of true change - yes, firewalls got smarter, likewise AV products (well, some anyway), IDS became IPS so it could actually stop something ... Continue Reading