Network Security Best Practices and Products
- May 21, 2014
Cisco beefs up its advanced malware defense products with the acquisition of malware sandboxing specialist, ThreatGrid.
- May 12, 2014
The Heartbleed bug highlights the industry's reliance on open source software and reveals a shocking lack of support.
- April 30, 2014
While the Heartbleed security bug prompts viability questions about OpenSSL, enterprises should be working with vendors to implement patches.
- April 28, 2014
Customers reveal how they support mobility and private clouds with next-generation firewalls.
- April 23, 2014
Enterprises are revisiting their security policy management processes in wake of high-profile breaches, but security fundamentals can't be ignored.
- April 10, 2014
SN blogs: This week, analysts discuss mobile security risk management, the importance of incident reporting and the future of software-defined data centers.
- April 04, 2014
Enterprise IT teams must address security pitfalls, assign BYOD policies for personal devices in the workplace, says vendor panel at Interop 2014.
- April 01, 2014
One year after acquiring Coyote Point Systems, Fortinet releases its first high-end application delivery controllers for enterprises and MSPs.
- March 28, 2014
SN blogs: This week, analysts discuss what it takes to secure a network, end-user themes for 2014 and why hyper-convergence is tricky for vendors.
- March 26, 2014
If enterprise security is to be successful, it's critical that engineers and IT executives work toward a common goal.
- March 13, 2014
SN blogs: Experts discuss solutions to security skills shortages, bandwidth consumption patterns and preparing for VoIP.
- March 13, 2014
Experts discuss new Wi-Fi standards and steps to take in order to secure networks to keep up with advancing technology.
- March 12, 2014
A series of new Fortinet DDoS protection appliances offer low-latency and behavioral analysis of volumetric and application-layer attacks.
- March 05, 2014
SSH security is going unmanaged, leaving organizations susceptible to internal, external attacks. Centralized management of SSH keys is necessary.
- February 28, 2014
Enhancements to Tufin's firewall management software will help with application lifecycle management and troubleshooting.