Fast Packet

Networking blogs: Big data security trifecta, distributed firewalls

Matt Toomey, Associate Editor

The big data security analytics 'trifecta'

Conventional wisdom states that status quo security isn't adequate against today's growing cyberthreats, so we need more sophisticated analytics to combat threats in the face of big data.

    Requires Free Membership to View

But what exactly is the "big data" behind big data security analytics? Enterprise Strategy Group senior principal analyst Jon Oltsik contends that big data security analytics haven't yet reached their true potential.

Read now to learn the three key areas Oltsik believes big data security analytics need to encompass in order to work effectively in today's security landscape.

The realpolitik of technical pre-sales

Years of bitter experience in technical pre-sales has taught Glen Kemp the cold hard truth: Being right doesn't pay the bills. Glen lays out how he struggles to toe the line between knowledge and experience, giving customers what they ask for rather than what he believes they need or what would cost them less.

Find out why pragmatism always wins out over idealism when it comes to technical sales.

NetApp built-in packet capture

Mike Brown has been kind enough to save you the trouble of having to contact NetApp tech support to use NetApp's packet capture.

Read now for easy step-by-step instructions and accompanying screenshots.

What is a distributed firewall?

The interests of security don't often translate into networking. While we do have firewalls to provide security, this security is far from guaranteed. Typically, physical and virtual firewalls hang off the network somewhere catching steered packets -- and we can only hope the network was configured correctly to steer the right traffic to the right policy. In this post, Brad Hedlund delves into the distributed firewall, where traffic steering is removed from the process of implementing security policy.

Continue reading to find out Brad's key takeaways from the distributed firewall.

This was first published in July 2013

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

Disclaimer: Our Tips Exchange is a forum for you to share technical advice and expertise with your peers and to learn from other enterprise IT professionals. TechTarget provides the infrastructure to facilitate this sharing of information. However, we cannot guarantee the accuracy or validity of the material submitted. You agree that your use of the Ask The Expert services and your reliance on any questions, answers, information or other materials received through this Web site is at your own risk.