Network Security Best Practices and Products
- July 22, 2013
In this week's blog roundup, get an expert's insights on Cisco's unique approach to SDN, and find out why EMC thinks EVAS has bright future.
- July 17, 2013
Cisco security CTO Bret Hartman explains how software and SDN are shaping Cisco's security strategy.
- July 12, 2013
In this week's blog roundup, read about the three areas big data security needs to encompass, and get expert insight on distributed firewalls.
- July 11, 2013
Security architect Glen Kemp says that enterprises must do more than deploy automated penetration testing to ensure Website security.
- June 27, 2013
In this week's blog roundup, get CCIE exam study tips, find out how CISOs can keep control of IT, and learn more about integrating overlay networking.
- June 19, 2013
In this week's blog roundup, read why network forensics tools may be the next IDS and get some perspective on Juniper's business strategies.
- June 18, 2013
Marble Security released its new cloud-based mobile security service that can work with MDM tools for protection of employee-owned mobile devices.
- June 18, 2013
F5 has engineered a mobile provider firewall software that takes an application-specific approach.
- June 12, 2013
Fraudsters are using P2P protocols to improve resiliency of malware command and control. Damballa responds with a P2P malware profiler.
- May 30, 2013
This week, bloggers endorse the Agile approach to development and offer their reaction to VMware's new hybrid cloud service.
- May 23, 2013
As network attacks grow in intensity, network administrators are still seeking tools to block intrusions.
- May 10, 2013
Password-based authentication is becoming more taxing for users, especially on mobile devices. The FIDO Alliance is developing alternatives.
- May 09, 2013
The new NS series of McAfee IPS appliances offers 40 Gbps. McAfee has also acquired NGFW vendor Stonesoft.
- April 04, 2013
Bloggers in this week's roundup advise ditching tech-specific plans for more general corporate strategies, and approaching tech support with caution.
- March 26, 2013
In this week's networking roundup, bloggers discuss the good and bad of wireless management and why IT should trust their smart storage technology.