Features
Features
Network device security: Appliances, firewalls and switches
-
The 5 different types of firewalls explained
Read up on the five different firewalls' similarities and differences, the three firewall deployment models and tips for choosing the firewall that best meets your company's needs. Continue Reading
-
Weighing the future of firewalls in a zero-trust world
Cybersecurity pros have been predicting the firewall's demise for years, yet the device is still with us. But does it have a place in zero-trust networks? One analyst says yes. Continue Reading
-
Zero-trust framework ripe for modern security challenges
What is zero-trust security, and why deploy it now? Analysts explain its importance in the current IT era and how to get started with evaluation and implementation. Continue Reading
-
VMware's internal Service-defined Firewall reimagines firewalling
VMware's internal firewall uses a global view of known-good behavior at the network and host level to minimize the attack surface for on-premises and cloud environments. Continue Reading
-
6 firewall selection criteria to purchase NGFWs
These six key factors will help your company determine the best NGFW product for your organization's needs. Continue Reading
-
Next-generation firewall comparison based on company needs
Compare leading next-generation firewalls to help find the option that best fits your IT environment and security needs. Continue Reading
-
Next-generation firewalls vs. traditional and UTMs
Learn the advantages of next-generation firewalls that protect enterprise networks from attacks and intrusion, as well as the differences between NGFWs and traditional firewalls. Continue Reading
-
Zero-trust security model primer: What, why and how
What exactly is a zero-trust security model? This primer explains the basics about the philosophy behind how designing a security architecture strictly limits access to all, not just outsiders. Continue Reading
-
MSSPs add advanced threats as managed security services gain hold
Skill shortages and budget constraints have lead some companies to adopt a hybrid approach to managed security. Is it time for CISOs to start looking for 'expertise as a service'? Continue Reading
-
Sharpen your DDoS detection skills with the right tool
DDoS detection and prevention tools are more sophisticated than ever. But finding the right one for your company takes studying and asking vendors the right questions. Continue Reading
-
Ransomware prevention tools to win the fight
Fighting malware today means battling ransomware. Learn what ransomware prevention tools you need to acquire and how to perfect using the tools your company already owns. Continue Reading
-
Industrial Network Security
In this excerpt from chapter 3 of Industrial Network Security, authors Eric D. Knapp and Joel Langill discuss the history and trends of industrial cybersecurity. Continue Reading
-
Critical Watch FusionVM: Vulnerability management product overview
Expert Ed Tittel examines Critical Watch FusionVM, a vulnerability management tool that comes in cloud-based offering and virtual appliance or virtual scanner versions. Continue Reading
-
Tripwire IP360: Vulnerability management product overview
Expert Ed Tittel examines vulnerability management products from Tripwire, including the rack-mounted IP360 appliance and the cloud- based PureCloud Enterprise service. Continue Reading
-
Tenable Nessus Vulnerability Scanner: Product overview
Expert Ed Tittel examines the Nessus vulnerability scanner series from Tenable Network Security, which includes client, cloud and on-premises vulnerability management products. Continue Reading
-
SAINT 8 Security Suite: Vulnerability management product overview
Expert Ed Tittel examines SAINT 8 Security Suite, a product that scans operating systems, database applications and web applications to identify assets and find vulnerabilities. Continue Reading
-
Rapid7 Nexpose: Vulnerability management product overview
Ed Tittel examines Rapid7 Nexpose, a vulnerability management product for physical, virtual, cloud and mobile environments that discovers assets and scans for vulnerabilities. Continue Reading
-
Qualys Vulnerability Management: Product overview
Expert Ed Tittel examines Qualys Vulnerability Management, a product for organizations of all sizes that is designed to help admins identify, monitor and mitigate vulnerabilities. Continue Reading
-
Core Security's Core Insight: Vulnerability management product overview
Expert Ed Tittel takes a look at how Core Security's Core Insight accepts output from multiple vulnerability management scanners to present a single-pane view of vulnerabilities. Continue Reading
-
Beyond Security's AVDS: Vulnerability management product overview
Expert Ed Tittel examines Beyond Security's Automated Vulnerability Detection System, which scans IP-based network infrastructures to detect vulnerabilities and identify assets. Continue Reading
-
Aruba RFProtect WIPS: Product overview
Expert Karen Scarfone examines the features of Aruba RFProtect, a wireless intrusion prevention system to detect and block WLAN attacks against enterprise networks. Continue Reading
-
Cisco Adaptive Wireless IPS: Product overview
Expert Karen Scarfone looks at the features and functionality of the Cisco Adaptive Wireless IPS, a wireless intrusion prevention system to monitor and protect WLANs. Continue Reading
-
Check Point Next Generation Firewall: Product overview
Check Point Next Generation Firewall family combines firewalls with unified threat management technology, VPNs and more. Expert Mike O. Villegas takes a closer look. Continue Reading
-
Cisco ASA with FirePOWER: NGFW product overview
Cisco combined the ASA series firewall with SourceFire's FirePOWER threat and malware detection capabilities. Expert Mike O. Villegas takes a closer look at this NGFW. Continue Reading
-
Protect your security perimeter with bellwether technologies
Protecting your security perimeter is getting harder, as the threats get more sophisticated and the perimeter harder to identify. But these eight bellwether technologies can help. Continue Reading
-
Proper network segments may prevent the next breach
Companies still fail to implement secure network segmentation and role-based access. Here's how to protect your sensitive data and stay out of the headlines. Continue Reading
-
Addressing NFV security issues in the enterprise
Network functions virtualization can complement SDN and benefit enterprises, but there are NFV security considerations that must be addressed. Expert Judith Myerson explains. Continue Reading
-
What EMM tool is on your short list?
EMM vendors consolidate tools for enterprise mobility management, covering device, application and even identity management, into ‘single-pane-of-glass' management consoles. Continue Reading
-
Comparing the best network access control products
Expert Rob Shapland takes a look at the best network access control products on the market today and examines the features and capabilities that distinguish the top vendors in this space. Continue Reading
-
Dell SonicWall NSA UTM: Product overview
Expert David Strom explains why the feature-rich Dell SonicWall NSA Series of enterprise unified threat management devices may take some getting used to. Continue Reading
-
WatchGuard UTM appliances: Product overview
Expert Ed Tittel examines WatchGuard UTM appliances that bundle different kinds of network infrastructure protection into a single device for small, midsize and large businesses. Continue Reading
-
Sophos SG Series UTM: Product overview
Expert Ed Tittel looks at the Sophos SG Series of unified threat management appliances, which bundle various kinds of network infrastructure protection into a single device. Continue Reading
-
Fortinet FortiGate UTM: Product overview
Expert Ed Tittel looks at Fortinet FortiGate UTM appliances, which combine different network infrastructure protection features into a single device. Continue Reading
-
Cisco Meraki MX appliances: UTM product overview
Expert Ed Tittel examines Cisco's Meraki MX UTM Appliances, a series of UTM products that combines various network security and protection features into a single device. Continue Reading
-
Check Point UTM Threat Prevention Appliances: Product review
Check Point UTM Threat Prevention Appliances are recognized by our reviewer as consistent software architectures that are easy to configure. Continue Reading
-
How to amp up enterprise security with a suite of tools
Vendors are increasingly offering security via a suite of tools. Here's how to use them to improve enterprise security while avoiding the drawbacks like functions overlap. Continue Reading
-
Integrated security suite? How to avoid tool overlap
The versatility of Swiss Army knife-like platforms may override existing security controls. Here's how to cut out overlap and get the most function out of multi-tools. Continue Reading
-
Drowning in a sea of cybersecurity tools?
Here’s how to conquer the steady stream of new technologies and find the best security tools beyond point solutions. Continue Reading
-
Readers’ top picks for enterprise firewalls
The companies and key functionality organizations seek out when they upgrade or add firewall technology to their enterprise environments. Continue Reading
-
Comparing the top wireless intrusion prevention systems
Expert Karen Scarfone examines the top wireless intrusion prevention systems (WIPS) to help readers determine which may be best for them. Continue Reading
-
Comparing the best UTM products in the industry
Expert Ed Tittel examines the top unified threat management appliances to determine which one could be the best for your organization. Continue Reading
-
Six criteria for purchasing unified threat management appliances
Expert Ed Tittel explores key criteria for evaluating unified threat management (UTM) appliances to determine the best choice for your organization. Continue Reading
-
How UTM products can benefit your enterprise network environment
Expert Ed Tittel explains why unified threat management is the right holistic IT security approach for SMBs and how it can fit into the enterprise, as well. Continue Reading
-
Scour your enterprise with network security monitoring tools
Advanced network security monitoring tools offer new hope for catching malware threats that fly under the traditional radar. Continue Reading
-
Seven criteria for purchasing a wireless intrusion prevention system
Expert George V. Hulme details the important criteria to weigh when evaluating wireless intrusion prevention systems for enterprise security. Continue Reading
-
Introduction to unified threat management appliances
Expert Ed Tittel describes unified threat management (UTM) appliances and features, and explains its advantages to organizations of all sizes. Continue Reading
-
Six ways to use wireless intrusion prevention systems in the enterprise
Expert George V. Hulme presents six real-world use cases for the deployment of WIPS to beef up wireless network security in the enterprise. Continue Reading
-
Introduction to wireless intrusion prevention systems in the enterprise
Expert contributor George V. Hulme explains how wireless intrusion prevention systems (WIPS) protect enterprise networks from attacks and prying eyes. Continue Reading
-
Three things to consider before deploying a next-generation firewall
Expert contributor Mike Villegas outlines the three factors to consider when making the decision to purchase and deploy a next-generation firewall. Continue Reading
-
Product review: Juniper Networks SRX Series UTM appliances
The market-leading Juniper Networks SRX Series of UTM boxes are feature-rich products that may cause implementation headaches. Continue Reading
-
Buying security: Unified threat management, or UTM, products
Looking for an enterprise unified threat management (UTM) product? Expert David Strom offers UTM buying guidance on features, functions and price. Continue Reading
-
Security: The genesis of SDN
SDN is a design with security as its foundation, and it has the potential to solve traditional networking's glaring security issues. Continue Reading
-
Firewalls play by new rules
Modern firewalls offer greater application awareness and user controls. Protect your migration strategy with these tips from the pros. Continue Reading
-
Unlock new pathways to network security architecture
Cover story: Want to shed appliances? Consolidation and new platforms hold promise for security teams. Continue Reading
-
Firewall comparison: Packet-filtering firewalls versus proxy firewalls
Stateful packet-filtering firewalls account for more than 90% of the market, but the proxy firewall folks haven't rolled up their tents yet. In this firewall comparision you will discover which is better for your enterprise? Continue Reading
-
Hping: How to better understand how hackers attack
Hping's packet-crafting function can point out holes a black hat may exploit, as well as spot imperfections in hackers' forgeries. Continue Reading
-
Firewall checkup: Testing your firewall's health
Uncover six important steps for testing your firewall to make sure it is running safely and smoothly. Continue Reading
-
Top challenges facing defense-in-depth firewall technology
Defense-in-depth firewall technology may offer value, but there are six barriers thwarting firewall technology on the port level. Continue Reading
-
Merging firewalls: Making your enterprise more secure with Sidewinder
Review: Secure Computing creates an impressive product by merging two leading firewalls into the Sidewinder G2. Continue Reading
-
Pitfalls of security layers (and how to avoid them)
Overtaxed and mismatched security layers can affect many aspects of the enterprise, which can have long-lasting negative effects. Continue Reading
-
What the virtual perimeter means for firewall technology
Firewall technology makes it easier for businesses to recognize potential threats. With a virtual perimeter, enterprises can modify and adjust certain firewalls to their benefit. Continue Reading
-
Twelve ways to reduce PGP-based file transfer security risks
Learn why PGP systems, which are designed for file transfer security, are a good alternative to using VPNs. Continue Reading
-
Four steps to sound security vulnerability management
If you're bedeviled by swarms of alerts, you can take control by practicing good security vulnerability management with these four steps. Continue Reading
-
How network forensics analysis tools turn admins into detectives
Network traffic capture, sophisticated analysis and forensics capabilities make network forensics analysis tools useful in making security assumptions and allocating resources. Continue Reading
-
Gateway filtering and server hardening: Security sans user complaints
Incremental changes, including gateway filtering and server hardening, will lead to a tighter security model without provoking too much user backlash. Continue Reading
-
Network security case study: Inside the Cleveland Clinic
Using a SIM system to monitor information in a DMZ, the Cleveland Clinic provides a network security case study from which others can learn. Continue Reading