File sharing systems


  • How to handle out-of-band management for network infrastructure

    Out-of-band management can be used for handling network infrastructure. Expert Judith Myerson explains the benefits of out-of-band management and how it can be implemented.Continue Reading

  • Insider Edition: Beyond 'next gen': Putting a 21st century security strategy in place

    When it comes to having a 21st century security strategy, new thinking is critical. The network perimeter is essentially dead, but there are still plenty of firewalls guarding enterprise IT at crucial points. But it's time to stop hiding behind the "Next Gen" nomenclature and figure out what technology is really new and what you should be considering adding to your defense posture in order to achieve actual 21st century security in your enterprise.

    This Insider Edition of Information Security magazine examines what is actually new and useful in the realm of devices that protect traffic passing from one network to another. The increase in rule complexity and statefulness at the perimeter also begs the question of where these devices blur into the world of network analytics systems that are specifically aimed at advanced threats on the wire. What, in short, is the optimal deployment for stopping as much trouble as you can before it hits valued network-connected assets?Continue Reading

  • Proper network segments may prevent the next breach

    Companies still fail to implement secure network segmentation and role-based access. Here's how to protect your sensitive data and stay out of the headlines.Continue Reading

  • Ways to craft a better enterprise IT security roadmap

    In this SearchCIO webcast, Nemertes Research CEO Johna Till Johnson explains how CIOs should build a functional IT security roadmap.Continue Reading

  • EC2 Security Group bundles security policy for instances

    With a few exceptions, AWS customers have little control over the location or configuration of cloud infrastructure. EC2 Security Groups and Network Access Control Lists help protect workloads.Continue Reading

  • Draw up a data center network diagram you'll actually use

    Creating a data center network diagram is time-consuming but necessary work. Keep the scope narrow and know the priorities of your diagram to save time and energy.Continue Reading

  • PaaS provider hinges on four factors

    Selecting a PaaS provider involves many steps. Learn the top four considerations when making this decision.Continue Reading

  • Tips for generating the perfect VM image

    Image-based VM deployments can dramatically increase consistency when creating new VMs. Use these tips to configure the perfect VM on the first try.Continue Reading

  • Adjusting your network perimeter security

    Expert Johna Till Johnson explains how the enterprise perimeter became obsolete, and how to replace network perimeter security with an approach to perimeterless security.Continue Reading

  • The search for answers to ‘advanced threat’ defense

    Visibility into what is happening on your network may matter more than stopping an attack. Can technology keep up with advanced threats?Continue Reading

  • Combatting network threats: Look, Ma, no firewall!

    In this Q&A, a network engineer at the Rochester Institute of Technology explains his favorite weapons against network threats: user education and vulnerability scanning.Continue Reading

  • Are enterprises ready to use SDN yet?

    Software-defined networking (SDN) gained early traction with the companies that had the resources to deploy it and a clear, immediate need for its benefits: cloud providers, carriers and hyper-scale data center operators. They were eager to use SDN to make their networks more flexible, programmable and scalable. More importantly, they were willing to accept the possible hazards that come along with adopting a radically different network architecture.

    It was expected that SDN would soon trickle down to the enterprise. Yet even after several years, it turns out we're still in the early days, and many enterprises are not yet ready (or willing) to use SDN in their networks.

    It's time to look at realistic SDN use cases and deployment models for mainstream enterprises -- not just companies like Amazon and Google. In this issue of Network Evolution, learn more about how enterprises are likely to use SDN and if it will ever become the new normal in networking.

    Also in this issue, we explore what lessons network engineers can take away from the spate of high-profile network outages that affected companies such as United Airlines and the New York Stock Exchange earlier this year. Learn more about what's likely to take down your network and what steps enterprises can take to avoid it.

    Additionally, network engineers weigh in on the growing pressure to improve their fluency in security in light of the ongoing wave of data breaches and how it's affected their jobs.

    Continue Reading

  • Amid ongoing threats, network security training gains appeal

    Network engineers who have focused primarily on honing their routing and switching skills say having limited network security training is no longer adequate.Continue Reading

  • The CISO role's evolution from IT security to policy wonk

    As the need for a dedicated information security officer catches fire beyond firewalls, how should companies engineer the expanding CISO role?Continue Reading

  • Regaining control of cloud compliance

    As assets are moved to the cloud, organizations must take steps to ensure that cloud compliance requirements are upheld by third-party vendors. This is a major undertaking that requires knowledge of federal, state and international law; changing regulations; cloud security; and non-traditional information security controls and best practices. In this issue of Information Security magazine, we look at the shared responsibility model between organizations and service providers to protect data in the cloud.

    Many companies have elevated the visibility of the CISO function in response to a series of high-profile breaches. Some organizations are hiring fulltime CISOs for the first time. Others are shoring up their ranks. At mature organizations, it is not unusual to have board-level discussions about cyber-risk oversight, with concerns ranging from assets at risk, to information security responsibility and reporting structures. As the CISO position continues to be defined, we look at the role beyond IT.

    Investments in cybersecurity startups are taking off. Driven by CEO and board-level demand for promising technology aimed at protecting corporate networks and sensitive data, investors are pouring money into cybersecurity companies. While most investments are aimed at turning a profit for venture-capital firms, some companies are investing to reap the benefits of working with new technology and influence product development. We look at strategic partnerships and how funding startups can pay off.Continue Reading