Firewalls News

  • November 03, 2015 03 Nov'15

    Hybrid cloud challenges abound for AWS, VMware shops

    The first hurdle of hybrid cloud migration is tricky enough -- then the rest of the hybrid cloud picture comes into focus.

  • November 02, 2015 02 Nov'15

    Are enterprises ready to use SDN yet?

    Software-defined networking (SDN) gained early traction with the companies that had the resources to deploy it and a clear, immediate need for its benefits: cloud providers, carriers and hyper-scale data center operators. They were eager to use SDN to make their networks more flexible, programmable and scalable. More importantly, they were willing to accept the possible hazards that come along with adopting a radically different network architecture.

    It was expected that SDN would soon trickle down to the enterprise. Yet even after several years, it turns out we're still in the early days, and many enterprises are not yet ready (or willing) to use SDN in their networks.

    It's time to look at realistic SDN use cases and deployment models for mainstream enterprises -- not just companies like Amazon and Google. In this issue of Network Evolution, learn more about how enterprises are likely to use SDN and if it will ever become the new normal in networking.

    Also in this issue, we explore what lessons network engineers can take away from the spate of high-profile network outages that affected companies such as United Airlines and the New York Stock Exchange earlier this year. Learn more about what's likely to take down your network and what steps enterprises can take to avoid it.

    Additionally, network engineers weigh in on the growing pressure to improve their fluency in security in light of the ongoing wave of data breaches and how it's affected their jobs.

  • October 19, 2015 19 Oct'15

    Big data applications to drive Walmart reboot

    We may have outlived the era of killer apps in some part defined by Walmart, but Hadoop big data applications may help the giant's quest for more growth.

  • October 14, 2015 14 Oct'15

    Windows 10 security fixes longtime OS vulnerabilities

    Windows 10 security incorporates years of improvements to remove or mitigate long-term issues with Windows vulnerabilities.

View All News

Firewalls Get Started

Bring yourself up to speed with our introductory content

View All Get Started

Evaluate Firewalls Vendors & Products

Weigh the pros and cons of technologies, products and projects you are considering.

View All Evaluate

Manage Firewalls

Learn to apply best practices and optimize your operations.

View All Manage

Problem Solve Firewalls Issues

We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.

  • Regaining control of cloud compliance

    As assets are moved to the cloud, organizations must take steps to ensure that cloud compliance requirements are upheld by third-party vendors. This is a major undertaking that requires knowledge of federal, state and international law; changing regulations; cloud security; and non-traditional information security controls and best practices. In this issue of Information Security magazine, we look at the shared responsibility model between organizations and service providers to protect data in the cloud.

    Many companies have elevated the visibility of the CISO function in response to a series of high-profile breaches. Some organizations are hiring fulltime CISOs for the first time. Others are shoring up their ranks. At mature organizations, it is not unusual to have board-level discussions about cyber-risk oversight, with concerns ranging from assets at risk, to information security responsibility and reporting structures. As the CISO position continues to be defined, we look at the role beyond IT.

    Investments in cybersecurity startups are taking off. Driven by CEO and board-level demand for promising technology aimed at protecting corporate networks and sensitive data, investors are pouring money into cybersecurity companies. While most investments are aimed at turning a profit for venture-capital firms, some companies are investing to reap the benefits of working with new technology and influence product development. We look at strategic partnerships and how funding startups can pay off. Continue Reading

  • Rethinking network monitoring software for the user experience

    Just because the dashboard in your network monitoring software shows that everything is functional doesn't guarantee it's functioning well for users. Continue Reading

  • Steps to take in order to secure virtual machines

    Something as small as a flash drive can be a danger to your virtual machines and the data inside them. Make sure to keep your info secure. Continue Reading

View All Problem Solve