They Want Your Enterprise Brains: Night of the Botnet of Things
The Internet of Things comes with a security downside that can't be ignored.
As we move forward into the virtualized, mobilized, cloud-based data center of the future, network security becomes more vital than ever. Cyber crimes are on the rise, with forty-eight percent more successful attacks on organizations per week in 2012 than in 2011, according to a 2012 Ponenon Institute study. The costs of these attacks on enterprises have risen, too. To protect the confidentiality and integrity of your firm's data and secure your network against DDoS and other attacks, you must stay on top of the latest in network security tools. That's where our Network Security Resources come in. From firewall management and security appliance reviews to Virtual Private Network (VPN) and network forensics buyers' guides and network access control (NAC) tools, let our experts help you find the right protection for your network.
The Internet of Things comes with a security downside that can't be ignored.
New study from Fortinet shows a surprising disregard for BYOD policies.
NAC vendor announces platform for integration, information sharing, visibility, and security automation with CounterACT.
New Silicon ASICs power FortiGate-3700D Data Center Firewall
Security startup uses microvirtualization and hardware isolation to protect the perimeter from attacks.
Nowhere is security more of a moving target than in virtualized and software defined environments. Vendors at VMworld look to address that.
NAC market growth spawns new Endpoint Visibility, Access and Security (EVAS) category. How can EVAS solutions enhance security?
Network and application visibility and monitoring solutions vendor promises seamless security and swift defense through software defined networking.
Distributed enterprise networks must take different measures to mitigate threats than their more centralized counterparts.
AVG CloudCare aims to solve SME endpoint security and management headaches while ramping up protection.
It's not Patch Tuesday anymore. Maximize your network's security with these patch management system tips.
Workers want to use their preferred file hosting services and productivity applications. How do you keep them happy while keeping your data and network secure?
Simplicity and accessibility make SEP SBE 2013 a strong security choice for small and medium businesses.
Firewall Security Manager (FSM) from SolarWinds brings unification to firewall management by centralizing control into a single easy-to-use application.
NetCitadel unifies security with a cloud service that is both easy to use and vendor agnostic, eliminating many of the challenges faced by security administrators.
We cover everything you need to know about Mobile Device Management (MDM) products, from must-have features to vendors large and small.
Fortinet adds enterprise-class IPv6-ready appliance and a carry-grade security blade to its Firewall product lineup.
Strong security is a must for any network provider and deep packet inspection as well as behavioral analysis are leading the way to more secure networks.
CounterACT takes an automated Swiss army knife approach to controlling network access.
Red Seal's Network Advisor and Vulnerability Advisor work in tandem to uncover and alert your admins to configuration vulnerabilities in the network.
Bradford's Network Sentry layers NAC solutions atop a modular foundation that delivers visibility into and context around the world of alerts and indicators.
Avenda’s eTIPS strives to fit NAC into any network, small or large.
In this network hardware buying guide, we pose questions that every organization should ask when selecting a NAC Appliance.
Your logs aren't just for auditing and compliance, they can also be used in an SIEM solution that will remediate for security risk and threats.
NIKSUN NetDetector Alpine marries IDS and network forensics.
Solera DeepSee uses speedy forensic data navigation to improve time-to-resolution
In this EnterpriseNetworkingPlanet Network Forensics Appliance buying guide, we look at how RSA's acquisition of NetWitness marries two best-of-breed products to create a comprehensive monitoring solution
E-Class appliances use reassembly free deep packet inspection to deliver speedy application intelligence and control.
Next-generation firewall pioneer continues to raise the bar, using App-ID to control port-hoppers and encrypted Web apps.
Given the rise of Web 2.0 and targeted malware, first-generation firewalls are not effective in dealing with current and emerging threats. Next-generation firewalls can detect application-specific attacks and enforce application-specific security policies.
E-Class SRA appliances offer flexible-yet-secure mobile access, governed by unified policies.
MAG Series Junos Pulse gateways unify network access control and SSL VPN to deliver safer mobile access.
Using AnyConnect Secure Mobility, Cisco leverages its VPN appliance to enable 'borderless' protection.
The days when a virtual private network meant just employee access from a laptop are gone. Today's VPN appliances must juggle on- and off-site smartphones, tablets, notebooks, you name it -- giving VPN shoppers a new set of challenges.
Metasploit's a complex project, but it's an essential penetration testing tool. Learn to tame its power with Armitage, a GUI for Metasploit.
Sometimes I think that Google and other search engines should have a sign at the top of the page: Surf at your own risk!
When it comes to network security, Murphy's Law might read a little differently: If something can leave you vulnerable, it will leave you vulnerable.
While your network security team spends its time worrying about network-based attacks, the number of data breaches chalked up to Web applications continues to grow. Are you fighting yesterday's battles, too?
Keeping up on your patches is only half the battle. Here are six security sites and mailing lists you should be making part of your efforts to keep up on the fast-moving field of network security.
You want to restrict traffic and enhance network security, your users want to get at that traffic. Here are a few techniques that demonstrate how tossing up a firewall won't do you any favors.
Are open source network security apps a good choice for your company? A look at the pros and cons. Plus: a handful of apps in the forefront.
If you want to bring your existing identity services to your mobile users, these RADIUS servers can do it for very little money.
You should use Enterprise mode security on your Wi-Fi network, but it's a complex task to configure 802.1X security. Avenda's Quick1X offers a handy wizard and other tools to make the job simpler.