Premium Content

Access "Context makes network security policy smarter, but not easier"

Issue Overview

Network Evolution - August 2014 Vol.5 / No. 5

Traditional approaches to network security are no longer sufficient to combat today's advanced threats. Attacks now target users and applications, and experts say an approach called context-aware security is essential to the defense. That's because a context-based model dynamically adapts network security policy based on how an activity correlates to known patterns of behavior, identity, data classification and device profiles. But it's an approach that's best for enterprises with mature security programs, as discussed in this edition of Network Evolution. Network security teams that use context-based strategies without having done the upfront architecture work are set up for failure.

Also in this issue, we find network engineers easing into software-defined networking (SDN) with a hybrid model that gradually or partially introduces SDN into a legacy networking environment. And finally, find out why several networking pros say learning a programming language is now vital.  Access >>>

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

What's Inside


More Premium Content Accessible For Free

  • The cloud on the networking horizon

    This Technical Guide examines how cloud has affected networking. It breaks down the concept of network as a service (NaaS) and its use in ...

  • Discover the next generation of mobile application performance management

    Traditional application performance management (APM) tools have given network managers little, if any, visibility into what causes performance ...

  • How to manage and monitor the converged network

    The network is converging. Voice, video, and storage and data networks are already converged, and more recently networking pros have had to tackle ...