Features
Features
Network security
-
VPNs persist amid the rise of ZTNA, other VPN alternatives
VPN use continues despite its outdated status in the networking industry. But usage has declined as enterprises make room for remote access alternatives, like ZTNA, SASE and more. Continue Reading
-
GSK unifies networking and security for cloud migration
Sessions at ONUG Fall 2023 emphasized the value of a unified networking and security approach. GSK integrated the two to begin its digital transformation journey to the cloud. Continue Reading
-
An overview of 802.1X authentication methods and EAP
Enterprises use 802.1X authentication to manage their wireless LANs, and that process relies on the Extensible Authentication Protocol and its various types. Continue Reading
-
Wireless security: WEP, WPA, WPA2 and WPA3 differences
As wireless networks have evolved, so have the protocols for securing them. Get an overview of WLAN security standards, and learn the differences among WEP, WPA, WPA2 and WPA3. Continue Reading
-
Evaluate various SASE approaches for deployment
Enterprises must choose between single- or multivendor SASE approaches, as well as DIY or managed service options. Experts suggest considering use cases to simplify SASE deployment. Continue Reading
-
Cloud, security and automation alter networking roles
Networking pros are no longer in their own bubbles, even if they prefer it that way. The growth of cloud, security and automation is expanding traditional networking roles. Continue Reading
-
VPN vs. zero trust vs. SDP: What's the difference?
For strong network security, many vendors say VPNs don't cut it anymore. Enter the zero-trust security model and SDPs. Continue Reading
-
How to choose the best ZTNA vendor for your organization
In a sea of options, finding the best ZTNA vendor for your organization can pose a major challenge. Weed through the marketing hype with advice from the experts. Continue Reading
-
SecOps and cybersecurity basics for NetOps teams
To bridge the gap between NetOps and SecOps teams, network pros should know security fundamentals, including different types of attackers, attacks and available security services. Continue Reading
-
Edge, public cloud, security drive network transformation
Networking is starting to reflect innovations in compute and public cloud. A notable change will be how network teams view networking and security as a holistic platform. Continue Reading
-
SecOps' need for traffic data drives NetSecOps collaboration
Security teams want to analyze network traffic data to identify anomalies and threats. As a result, network and security teams need to find ways to work together. Continue Reading
-
How enterprises can close 5 major SASE gaps
Despite five major gaps that hamper SASE implementation, Gartner recommended enterprises should plan their migration timeline and aim to consolidate to a single vendor. Continue Reading
-
The complete Secure Access Service Edge (SASE) guide
SASE helps organizations manage and secure external traffic. But is it the best choice for your environment? Find out how to buy, deploy and manage SASE in this adoption guide. Continue Reading
-
Get started with network penetration testing for beginners
Authentication, patching and configuration are among the most common vulnerabilities found through network penetration testing. Learn more in this free chapter excerpt. Continue Reading
-
Advice on how to learn network penetration testing skills
As beginners learn network penetration testing skills, they should remember these expert tips: Pay attention to what the client wants, and stick to offense, not defense. Continue Reading
-
3 SASE case studies exploring real-world deployments
Three case studies demonstrate how SASE technology helps organizations securely connect geographically distributed workforces. Continue Reading
-
SASE market emerges and grows as the 'wave of the future'
Secure Access Service Edge is the latest technology to garner industry buzz in networking and security. Although it's still relatively new, the technology is making waves. Continue Reading
-
SolarWinds: Lessons learned for network management, monitoring
In this roundup of networking blogs, experts reveal the critical lessons learned from the SolarWinds hack in regard to network management and monitoring capabilities. Continue Reading
-
5 networking startups helping enterprises adapt and prepare
Even in a global pandemic, these five networking startups continue to impress. Learn how their innovative technologies can help enterprises prepare for unforeseen challenges. Continue Reading
-
Top network attacks of 2020 that will influence the decade
You've heard of phishing, ransomware and viruses. Now, keep them in mind because one cybersecurity expert says these threats and more may cause IT headaches for the next decade. Continue Reading
-
Advice for an effective network security strategy
Security audits, evaluations of tools and looking realistically at trending technologies are some ways an organization can ensure its network security is the best it can be. Continue Reading
-
Network monitoring market converges with security analytics
As cyber attacks increase and enterprise networks require threat detection and protection, network monitoring and security analytics are converging for more comprehensive visibility. Continue Reading
-
Network security in 2020 highlights zero trust, SD-branch
In this roundup of networking blogs, experts explore various aspects of network security -- from old and evergreen to new and innovative -- and the roles they play in 2020. Continue Reading
-
Top 5 VPN myths and misconceptions for IT organizations
Although VPN technology has its challenges, various misconceptions exist that can muddle IT teams' understandings of VPNs. Here are five common VPN misconceptions debunked. Continue Reading
-
NetOps-SecOps collaboration has its benefits and challenges
Companies are forming formal partnerships between their network and security teams. While this collaboration reaps benefits, some significant roadblocks remain. Continue Reading
-
Open Systems' SASE tech wins TechTarget innovation award
Open Systems' SASE platform helped tens of thousands of workers gain secure remote access during the COVID-19 crisis. Learn more about our new Network Innovation Award winner. Continue Reading
-
A glossary of the VPN terminology you need to know
For organizations with remote workforces, VPNs can be an essential part of daily life. This VPN glossary explores the essential terms and phrases that constitute VPN services. Continue Reading
-
What to include in an SD-WAN security checklist
SD-WAN security encompasses more than integrated security functionality. Find out which capabilities enterprises should look for when evaluating SD-WAN and security. Continue Reading
-
Network traffic analysis best practices: Assess and repeat
Network traffic analysis best practices require network teams to work closely with security teams and constantly assess their tool sets, analysis processes and traffic patterns. Continue Reading
-
A look inside 'CCNA 200-301 Official Cert Guide, Volume 2'
Network security is a crucial skills area for network engineers, and the CCNA 200-301 reflects this. Here's a chapter excerpt on network security from the new guide. Continue Reading
-
Security, business agility kindle network automation adoption
IT teams are confused by the multiple automation strategies available, but they're still adopting automation with hopes it will benefit network security and agility. Continue Reading
-
Network teams spend more time than ever on network security issues
The workloads of network teams have evolved from their original objectives because of network security threats. Yet teams are still expected to maintain their initial goals. Continue Reading
-
Why did operator NFV adoption lag so much?
NFV adoption was hampered by high costs and deployment issues, according to one industry insider. Also, learn about the latest on network security and industry hype. Continue Reading
-
The 5 network security basics you need to know
In this compilation, learn what network security is, as well as how it differs from cybersecurity, common -- and potentially confusing -- technologies, threats and more. Continue Reading
-
A glossary of 10 essential network security terms
This network security glossary covers both old and new key terms -- such as zero trust networks and microsegmentation -- that can bolster anyone's security vocabulary. Continue Reading
-
What networking analysts are saying about Cisco's future
Has Cisco outgrown networking? One industry insider seems to think so. Plus, other analysts size up Cisco's future around security and intent-based networking. Continue Reading
-
A quick guide to important SDN security issues
Lock down your knowledge of SDN security issues using this compilation that includes expert advice, common pain points and helpful best practices. Continue Reading
-
Enterprises use network security in the cloud to combat threats
The market for network security in the cloud is growing as enterprises shift workloads to the cloud to combat potential data breaches and system threats. Continue Reading
-
Growing CDN services market changes to meet cloud needs
Enterprises looking for greater network performance and scalability turn to traditional CDN services providers for nontraditional help to improve security and offer access to APIs. Continue Reading
-
Gordon: Trends driving network access control systems
Pulse Secure executive Scott Gordon cites industry trends driving the vendor's new product launch and how endpoint security is driving shifts in network access control systems. Continue Reading
-
SD-WAN security remains customer and vendor focus
Most SD-WAN vendors offer common features when it comes to SD-WAN security, but some tout security differentiators embedded in their services. Continue Reading
-
Blue Coat ProxySG: Secure Web gateway overview
With features like authentication and Web filtering, the Blue Coat ProxySG secure Web gateway can be deployed as a physical appliance, a virtual machine or a cloud-based service. Continue Reading
-
Palo Alto WildFire: Malware sandbox product overview
Tightly integrated with existing Palo Alto next-generation firewalls, the Palo Alto WildFire cloud-based malware sandbox service supports both public and private cloud deployments. Continue Reading
-
Facing network breach threats, visibility is key
In this Q&A, an IT pro at Penn Mutual shares how his dual strategy of user education and Layer 7 visibility helps prevent network breaches. Continue Reading
-
"Network Security: The Complete Reference," Chapter 10: Network device security
Chapter 10 focuses on using routers and switches to increase the security of the network as well as providing appropriate configuration steps for protecting the devices themselves against attacks. Continue Reading
-
To block or not to block: Rogue containment methods
Wireless network monitoring systems are quickly moving from detection alone to detection and prevention. In particular, many now provide options to "block" rogue devices, preventing wireless or wired network access. This tip explores how these ... Continue Reading
-
Fighting wireless DoS attacks
Despite recent 802.11 security advances, WLANs remain very vulnerable to Denial of Service attacks. While you may not be able to prevent DoS attacks, a WIDS can help you detect when DoS attacks occur and where they come from, so that you can track ... Continue Reading
-
Commonly overlooked security hazards
Security expert Dave Piscitello covers the ten most commonly overlooked security hazards and easy ways to prevent them from placing your network at risk. Continue Reading
-
Most popular viruses and hacking tools
Here are 2004's most popular hacker tools, viruses, remote tools, adware, spyware, Trojans and worms. Continue Reading
-
Network Security Principles and Practices: Secure LAN switching
This book excerpt offers steps you can take to make Layer 2 environments and switches more secure, including permit lists, protocol filtering and VLANs. Continue Reading