Network Security Monitoring
- October 27, 2017
Bloggers explore the dynamics of serverless computing architecture, efficacy and efficiency with endpoint security and use cases for bidirectional forwarding detection
- October 13, 2017
Bloggers explore cybersecurity evolution and its impact on network security, new network fabrics from Extreme and take a deep dive on routing protocols, such as BFD.
- September 07, 2017
Bloggers examine AppDefense -- a new VMware network security offering -- and look into synchronizing BGP and OSPF, as well as the capabilities of new Savvius analytics.
- July 14, 2017
Cisco plans to acquire security company Observable Networks. The acquisition would strengthen Cisco cloud security for AWS and Microsoft Azure.
- January 14, 2016
Cisco has launched a cloud security broker that finds, monitors and analyzes employee use of online services.
- December 21, 2015
Illumio wins SearchNetworking's Network Innovation Award for its Adaptive Security Platform.
- April 28, 2015
The latest Dell SonicWALL TZ is faster than previous firewall models and better equipped to protect SSL traffic.
- April 20, 2015
WildPackets, a network performance vendor, shifts its focus to security and rebrands with a new name, Savvius Inc.
- March 31, 2015
Microsoft provides Office 365 MDM at no cost, giving subscribers basic capabilities for mobile device management and the option of upgrading to the paid service Intune.
- January 29, 2015
Brocade is promoting router encryption in the release of its MLXe security module, but expert opinions fall short of unanimous endorsement.
- December 02, 2014
The Kemp LoadMaster ADC line will now come equipped with a Web application firewall, giving customers application-level threat protection.
- June 19, 2014
ForeScout CounterACT helps Broward College take control of mobile devices and secure network access control across multiple campuses.
- April 23, 2014
Enterprises are revisiting their security policy management processes in wake of high-profile breaches, but security fundamentals can't be ignored.
- April 17, 2014
NAC technology is stepping up to the plate to give better BYOD access control to enterprises.
- March 05, 2014
SSH security is going unmanaged, leaving organizations susceptible to internal, external attacks. Centralized management of SSH keys is necessary.