Information Security

Defending the digital infrastructure


Evaluate Weigh the pros and cons of technologies, products and projects you are considering.

Beyond the Page: Network security architectures

In this special report, Dave Shackleford explores advanced network security architectures that help segment and isolate traffic with in your data center.

Beyond the Page is a monthly online Information Security magazine supplement, offering an in-depth, multimedia-centric look at a topic featured in a given month's issue. It's an opportunity to provide you with even more expertise from a selection of our best Information Security magazine contributors.

In addition to the contributor's magazine feature, Beyond the Page also offers an exclusive webcast presentation to help security practitioners and decision makers alike understand an issue from all angles, as well as an exclusive technical article that offers practical advice on implementation, management or troubleshooting.

Our July/Aug. 2013 Information Security magazine Beyond the Page supplement covers advanced network security architectures. See the content below.

Information Security feature: New pathways to network security architecture
Want to shed tiers? Collapsing infrastructure with virtualization and advances in security platforms offers new techniques for security teams.

Video: Designing network security architecture: New trends, tools, techniques
NEW  Signature-based threat detection is losing effectiveness. Learn the latest methods to protect your network architecture from sophisticated attacks. (March 2014)

Video: Next Generation Network Security Architecture
In this presentation, Dave Shackleford outlines several key initiatives that may help you rethink your current network security design and determine whether virtual security options make sense for you.

Technical Tip: Evaluating network security virtualization products
Don't risk making mistakes when you evaluate network security virtualization products. These six key points will keep you on track.

About the contributor:
Dave Shackleford is the owner and principal consultant of Voodoo Security, Lead Faculty at IANS, and a SANS analyst, senior instructor, and course author. He has consulted with hundreds of organizations in the areas of security, regulatory compliance, and network architecture and engineering, and is a VMware vExpert with extensive experience designing and configuring secure virtualized infrastructures.               


Article 1 of 7
This was last published in October 2013

Dig Deeper on Network device security: Appliances, firewalls and switches

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

Get More Information Security

Access to all of our back issues View All