Buyer's Guide

Evaluate Weigh the pros and cons of technologies, products and projects you are considering.

Network security basics: A Buyer's Guide

This Buyer's Guide examines network security basics, starting with four critical network security tools for any enterprise. It also discusses the major use cases and buying criteria and compares leading products.

Introduction

For any enterprise, getting the network security basics right is critical, and next-generation threats require a next-generation approach. The challenge for network security architects today is to ensure network security tools work with each other rather than alongside each other, and not just at the network edge, but within the network itself.

Many network security systems are difficult to implement and require a trained staff to oversee updates and maintenance. The high overhead costs associated with this oversight means many network security tools are not implemented fully in the enterprise, leaving those organizations vulnerable to emerging threats and determined hackers.

Next-generation network security tools aim to correct this by providing overlapping protection to implement a defense-in-depth strategy. Firewalls, secure Web gateways, and intrusion prevention systems thwart attacks at the network's edge, while malware sandboxes provide strategic depth, and network access control tools protect the network from within.

1What is?-

The evolution of network security for the enterprise

Today's threats against data networks are more powerful than ever before. Next-generation security tools -- an essential element to network security basics -- provide defense-in-depth through tight integration and information sharing to better correlate potential threats.

Feature

How the basics of network security have evolved

In this article on network security basics, networking expert Andrew Froehlich lays out how network security tools have evolved. Continue Reading

2Do I need?-

The business case for network security tools

Next-generation security tools can help prevent data breaches that put the enterprise at risk from both a regulatory and customer trust perspective. A robust network security posture can also lower overhead costs and allow businesses to expand into BYOD, cloud services, IoT and other undertakings.

Feature

Questions to ask when choosing a network security tool

In this article, expert Andrew Froehlich breaks down the top use cases for network security, and lays out the questions you should ask when choosing a network security tool. Continue Reading

3How to buy-

Criteria to consider when buying network security products

Before making your purchasing decision, consider where your mission-critical data resides, how devices access your network, and how your network security tools will be deployed.

Feature

Determining the best network security measures for you

This article on network security lays out some of the major criteria to consider when purchasing network security tools for your enterprise. Continue Reading

4Which should I buy?-

Which network security products should I buy?

Network security basics call for a comprehensive examination of the wide range of network security products now available in the marketplace. But narrowing these down to the select few you will deploy in your network requires patience and a focused approach. Before you take the steps to buy, check out our comparison of the market's leading network security products.

Feature

Weighing your next network security product

In this article on network security, expert Andrew Froehlich compares the top vendors to help you choose the right network security product for your enterprise. Continue Reading

5Top product overviews-

A glance at the top network security products

Take a look at our product overviews of the leading network security vendors. These overviews cover products from the four essential categories -- malware sandboxes, secure Web gateways, NGFWs and network access control -- discussed earlier in the guide.

Feature

Next-gen firewalls: Check Point NGFW product overview

The Check Point NGFW comes with firewall throughput of up to 70 Gbps and support for up to 3 million connections per second. It can be deployed in SMBs and large enterprises. Continue Reading

Feature

Cisco ASA firewall: Network security product overview

Cisco ASA firewall products are Cisco's offering in the growing NGFW market. With FirePower intrusion prevention, they support deployments in small, medium and large businesses. Continue Reading

Feature

Palo Alto firewall: Network security product overview

Equipped with mobile security and endpoint protection solutions, Palo Alto firewall products are suitable for a range of deployments, including large and small enterprises. Continue Reading

Feature

Bradford NAC: Network security product overview

Bradford Network Sentry products can be deployed as on-premises hardware appliances, virtual machines or cloud-based services, and they support connection of BYOD devices. Continue Reading

Feature

Cisco Identity Services Engine: Security product overview

The Cisco Identity Services Engine network access control system can be deployed as an appliance or virtual machine in a private cloud and offers compatibility for BYOD devices. Continue Reading

Feature

ForeScout NAC: Network security product overview

ForeScout NAC products can be deployed as hardware appliances or virtual machines. Designed for both small and large enterprises, they can support up to 10,000 end devices. Continue Reading

Feature

Blue Coat ProxySG: Secure Web gateway overview

With features like authentication and Web filtering, the Blue Coat ProxySG secure Web gateway can be deployed as a physical appliance, a virtual machine or a cloud-based service. Continue Reading

Feature

Websense Triton: Secure Web gateway overview

Available as an appliance, a VM and a cloud service, the Websense Triton Web gateway offers a number of features, including integration with other Websense security products. Continue Reading

Feature

Zscaler gateway product overview

Equipped with advanced security features such as cloud intelligence, botnet detection, sandboxing and more, the Zscaler Web gateway is deployed solely through the cloud. Continue Reading

Feature

FireEye AX series: Sandbox product overview

The FireEye AX series sandbox products are capable of up to 16,000 analyses per day, are available for multiple OSes and come with 24/7 support for mission-critical deployments. Continue Reading

Feature

Palo Alto WildFire: Malware sandbox product overview

Tightly integrated with existing Palo Alto next-generation firewalls, the Palo Alto WildFire cloud-based malware sandbox service supports both public and private cloud deployments. Continue Reading

Feature

Triton AP: Websense sandbox product overview

Websense sandbox products come as physical appliances, software virtual machines, and cloud services. They also integrate with Websense's Web gateways and email security tools. Continue Reading

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

SearchSDN

SearchEnterpriseWAN

SearchUnifiedCommunications

SearchMobileComputing

SearchDataCenter

SearchITChannel

Close