Choosing the right unified network security strategy

Choosing the right unified network security strategy

Date: Dec 20, 2010

Every year there is hype surrounding a new network security strategy. We've heard that Network Access Control (NAC) is a must, or that Intrusion Prevention Systems (IPS) are crucial. This year the application-aware firewall has taken center stage. So how do you know which network security features are must-haves and which network security appliance or software you should buy? What's more, is there a solid unified network security strategy that hits all of your most important pain points?

In this video, senior site editor Rivka Gewirtz Little sits down with Josh Corman and Andrew Hay of the 451 Group to discuss these network security best practices, including application-aware firewalls and unified threat management.

More on Network Security Best Practices and Products

  • canderson

    Regulatory pressure accompanies changing IT landscape

    VIDEO - The new IT landscape is more virtual, distributed and increasingly mobile. It's more interconnected with applications talking to each other. Threats are evolving and so is regulatory pressure. All of this creates security compliance challenges.
  • canderson

    Implementing a new security management plan

    VIDEO - To respond to increased cyberthreats, enterprises need to form their network's security plan around the idea of pervasive protection, which is based on the notion of a centrally managed security system.
  • canderson

    Pervasive protection is the new security paradigm

    VIDEO - Pervasive protection encompasses risk management, forensics, identity authentication and risk management to provide a centralized approach to security management that protects your enterprise network in a modern IT landscape.
  • McAfee firewall integrates with the rest of McAfee's security tech

    News - McAfee has established a security platform that combines its next-generation firewall with endpoint security, SIEM, threat intelligence and sandboxing.

    ( Oct 16, 2014 )

  • Security breach anxiety forces IT orgs to delay new projects

    News - With each massive security breach that hits the news, IT organizations are becoming more and more gun-shy about new business initiatives that could put data at risk.

    ( Oct 08, 2014 )

  • Network security growth won't slow at Cisco

    News - SN blogs: An analyst says that Cisco's security team remains strong; CloudFare offers free website encryption; and security is a business decision.

    ( Oct 03, 2014 )

  • Palo Alto Cyvera integration starts with WildFire

    News - Palo Alto starts to integrate network and endpoint security by connecting the WildFire sandbox to its Cyvera acquisition.

    ( Oct 02, 2014 )

  • Types of firewalls: An introduction to firewalls

    Tutorial - To keep your network data secure, start with this introduction to firewalls. This tutorial provides an overview of what firewalls are and what benefits they provide, how they work and different firewall types. Get important information you'll need to start auditing network traffic in the enterprise.

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: