Security

Security | News, how-tos, features, reviews, and videos

nw how to shop for enterprise firewall shopping cart
cyber security concept picture id1140691246

the latest in innovation in the sd wan managed services market1400

Aryaka broadens enterprise targets with managed SD-WAN, SASE services

Aryaka Networks is looking to target larger numbers of enterprise users with new managed Secure Access Service Edge service and an improved, lower cost SD-WAN offerings.

nw how to shop for vpn shopping cart

How to buy SASE

Secure Access Service Edge combines networking with security and bundles it up as a service, but there are differences among the offerings. Here’s key questions to ask vendors.

A broken link in a digital chaing / weakness / vulnerability

Cisco hit with software and physical issues

Customers may find their appliances compromised or a screw loose.

High-speed train tunnel / motion blur / speed / motion / forward progress / future / what's next

SmartNICs set to infiltrate enterprise networks

Use of smartNICs in the enterprise is just beginning to appear, and VMware, Pensando, Aruba, Intel, AWS, Nvidia and Juniper are getting in on the action.

nw how to shop for network shopping cart

How to buy Wi-Fi 6 access points

With more unlicensed wireless spectrum and specifications for MU-MIMO and OFDMA, the Wi-Fi 6 standard promises faster, more reliable networks, but not all vendors meet all the specs.

cloud security

Palo Alto software advances end-to-end enterprise cloud security

Palo Alto rolled out a new version of its core cloud security package, Prisma 3.0, which includes the ability to code security directly into SaaS applications.

SD-WAN  >  The concept of a visual transition from hardware cables to software code.

Rethinking the WAN: Zero Trust network access can play a bigger role

COVID-induced work-from-home prompted WAN innovations that demonstrate VPNs and SD-WAN aren’t the only good options.

A group discussion takes place around a table in an office workspace.

3 steps to better collaboration between networking and security pros

Enterprise Management Associates: Most organizations acknowledge failure to create fully successful teams to deliver reliable and secure cloud, data-center, and IoT initiatives.

zero trust security model secured network picture id1313494602

Nvidia jumps into Zero Trust

Nvidia is blending its BlueField data-processing units with its Morpheus AI security framework to contribute to a Zero Trust architecture.

hovering drone / camera / propellor blades

Drone demo shows it’s possible to protect 5G-managed devices from DDoS, exfiltration attacks

Using software developed by the Open Networking Foundation, Stanford researchers thwart wireless attacks in less than a second.

cloud security

Cisco tool makes it easier to meld SD-WAN, security domains

Cisco Integrated Domain support in its latest release of Cisco DNA Center and SD-WAN vManage boost SD-WAN securit

zero trust security model secured network picture id1313494602

Software-defined perimeter is a good place to start a rollout of Zero Trust network access

Software-defined perimeter can be an important part of Zero Trust that enforces network access, but first plan the Zero Trust architecture and the changes that means for the network and security.

Sun shines through the trees beyond a silhouette, alone in forest.

Gartner: Top strategic predictions for 2022 and beyond

Expect the unexpected – that’s one element of Gartner's top strategic predictions for 2022 and beyond, presented this week at the firm’s annual IT Symposium/Xpo Americas.

Upwardly pointing arrows overlay the face of Benjamin Franklin on the U.S. one hundred dollar bill.

Gartner says IT spending to top $4 trillion in 2022

Gartner says IT budgets are growing at the fastest clip in 10 years, fueled by purchases of infrastructure software and devices.

networking background

Aruba switch can cut the need for separate, single-function appliances

The Aruba CX 10000 switch integrates a DPU from Pensando that helps support firewall, DDoS, encryption, network-address translation, load balancing, network telemetry, and automation.

08 how deloitte is embedding security

Gartner: 8 security trends facing the enterprise

As organizations become less centralized they face new security challenges that require new ways of addressing threats that will change the basic fabric of network security, according to Gartner analysts. A persistent challenge...

digital screen with encryption data background big data with binary picture id1332211233

Gartner: Top strategic technology trends for 2022

Digital investments, be they in AI, cloud, security or engineering, will be among the top technology drivers for 2022, according to Gartner’s annual forecast of what it expects will be the top strategic IT trends for the coming year.

spot edgecomputing nww by andre popov shutterstock 2400x1600 primary 6

Edge computing: 5 potential pitfalls

Edge computing has many upsides including better near-real-time response and analytics for IoT, but it’s far from plug and play.

Load More