Network security basics for building better corporate systems

Last updated:May 2017

Editor's note

It's tempting to focus on the latest high-tech security tool but most infosec pros acknowledge that all those digital, cloud-based bells and whistles won't protect a network if the network security basics aren't in place. In the segments to this guide we cover basic first steps, touch on fundamentals like the importance of visibility even in the virtual age, while also peering into the future of network security. Readers of this guide should come away with a deeper understanding of network security basics and an overall "lay of the land" which it comes to securing the network.

1Visibility: How to preserve a network security basic

The most basic need for network security is visibility into the network itself; you can't secure what you can't see. Learn how even in this complex age of mobility and cloud, IT network pros can maintain their network's visibility to keep it secure.

2Whip-smart network security is possible. Here's how.

It's mind-boggling, the forces combining now to take network security far beyond the basics. Firewalls are integrating cloud-based threat information. Advances in machine learning are making tech tools designed to sense network threats ever more savvy. Current Defense Department projects on security mobile networks and devices will certainly lead to commercial applications. But while technological advances that help IT pros move beyond network security basics show great promise, they also bring their own challenges.

3Security considerations for software defining the network now

If network security basics are in place, a good next step for networking pros is to consider how to add software-defined networking to your setup. SDN can improve network functions but before and during implementation security must be foremost in mind. Learn how to get your network software-defined now.

4Materials to supplement your understanding of network security

These video presentations provide supplemental information on the threats modern networks must fight back and some of the tools available to aid that fight.