When you’re talking about security, simplicity should not be a determining factor. There has to be a sense of sophistication to whatever you install so that corporate data is not compromised. It can’t be so easy that any numbskull can hack away at your network.All IT managers strive for simplicity. Heck, who doesn’t want work to be less complex? Who doesn’t want a turnkey solution? Who doesn’t crave out-of-the-box gear?But when you’re talking about security, simplicity should not be a determining factor. There has to be a sense of sophistication to whatever you install so that corporate data is not compromised. It can’t be so easy that any numbskull can hack away at your network.And that’s the point Network World columnist and Global Test Alliance member Joel Snyder and I will hammer home during our upcoming Technology Tour: “Security: Protecting Your Enterprise and Its Assets.” Simple would be a plan that involved merely firewalls and antivirus software. Go beyond that and you have a comprehensive strategy that envelops the core of your network. Snyder says five contributing factors will make creating this strategy possible.First, the cost of security tools is dropping. You can put more elements into securing your network without breaking the bank. Second, performance is improving, so you’ll get more for your money. Third, the management tools that tie together all these elements are improving and becoming more interoperable. This gives you a clear view of where you need to shore up resources and where you have overprovisioned them. Fourth is the reality that policies regarding security are not a bad thing. This is the point that is most important. A few years ago, you couldn’t get past the drawing board in most organizations trying to creating a solid security plan. There were always exceptions based on politics within corporations that blew holes in an IT group’s security strategy.Finally, one of the biggest boons to making security a reality is the advancement of Layer 2 authentication. With 802.1X, we finally have a technique for figuring out who is trying to access a network before they get to the applications, Snyder says.The companies joining us on the tour – Foundry Networks, HP’s ProCurve Networking group, IBM, Lancope and VeriSign – will tackle the intricacies of developing a plan. They will discuss how to build security into the gear; integrate security management with traditional network management; embed security in remote desktops and mobile laptops; use new technologies such as intrusion prevention and detection to go beyond perimeter security; and employ encryption and certificates to restrict access.Don’t expect what you learn to be simple, but expect it to be thorough. That’s your best defense. (Register for the tour here.) Related content how-to Doing tricks on the Linux command line Linux tricks can make even the more complicated Linux commands easier, more fun and more rewarding. By Sandra Henry-Stocker Dec 08, 2023 5 mins Linux news TSMC bets on AI chips for revival of growth in semiconductor demand Executives at the chip manufacturer are still optimistic about the revenue potential of AI, as Nvidia and its partners say new GPUs have a lead time of up to 52 weeks. By Sam Reynolds Dec 08, 2023 3 mins CPUs and Processors Technology Industry news End of road for VMware’s end-user computing and security units: Broadcom Broadcom is refocusing VMWare on creating private and hybrid cloud environments for large enterprises and divesting its non-core assets. By Sam Reynolds Dec 08, 2023 3 mins Mergers and Acquisitions news analysis IBM cloud service aims to deliver secure, multicloud connectivity IBM Hybrid Cloud Mesh is a multicloud networking service that includes IT discovery, security, monitoring and traffic-engineering capabilities. By Michael Cooney Dec 07, 2023 3 mins Network Security Cloud Computing Networking Podcasts Videos Resources Events NEWSLETTERS Newsletter Promo Module Test Description for newsletter promo module. Please enter a valid email address Subscribe