Intrusion detection systems

Network security News

View All News

Network security Get Started

Bring yourself up to speed with our introductory content

View All Get Started

Evaluate Network security Vendors & Products

Weigh the pros and cons of technologies, products and projects you are considering.

  • What's the difference between NFV automation and NFV orchestration?

    NFV automation is the ability to transfer manual network configuration to technology; NFV orchestration creates the deployment and automation blueprint. Continue Reading

  • New year, new WAN: SD-WAN adoption takes off

    More and more enterprises are using software-defined networking principles in the wide area network, with industry experts predicting that SD-WAN adoption will skyrocket in 2017. In fact, some top analysts expect the market to grow as much as 90% every year for at least the next three years. In this edition of Network Evolution, we explore three diverse SD-WAN deployment stories to illustrate the growing trend and offer insight into how SD-WAN adoption plays out on the ground. These case studies examine the use of the technology in enterprises ranging from a garden equipment manufacturer to a major oil company, using products from three top vendors -- Cisco, Viptela and Cybera. If you're considering SD-WAN adoption in your wide area network, these real-world stories will offer valuable insight.

    Also in this issue, open source networking could open the door to even more big changes in the year ahead. One leading analyst says it's not a question of whether enterprises will ultimately use open source, but how.

    And finally, team messaging applications like Slack and HipChat make communicating easy, but they could also put enterprises at risk.

     Continue Reading

  • SD-WAN adoption: Exxon Mobil deploys Cybera technology

    In this case study, learn how SD-WAN adoption dramatically simplified a major oil company's wide area network while improving security and increasing flexibility. Continue Reading

View All Evaluate

Manage Network security

Learn to apply best practices and optimize your operations.

  • Are you ready for the latest software testing trends?

    From security to integration and flexibility, the software testing profession is undergoing more changes. Expert Matthew Heusser offers his best advice. Continue Reading

  • Insider Edition: Attaining security for IoT, through discovery, identity and testing

    Ever since the internet of things became a "thing," the potential for abuse has been well documented; how best to achieve security for IoT is not yet clear. This Insider Edition of Information Security magazine tackles that second issue head on.

    In three feature stories, our experts examine the key aspects closely related to IoT security: device discovery, IoT identity and IoT security testing. It's basic to security that, to devise a proper security strategy, a security team must possess an accurate record of what exactly needs to be secured. The challenge when it comes to security for IoT is in cataloging, assessing and classifying devices that can number into the thousands and are often located outside an enterprise's physical boundaries. Certain industries, such as healthcare, are well into tackling this challenge. But increasingly more companies of all sizes will have to give the issue careful attention. Discovery involves identity issues, another focus of this edition, and once a security team has refined their IoT security policy, the next logical step is to implement a process of IoT security testing.

    Readers of this Insider Edition will come away with a deeper understanding of how to approach security for IoT, from how to create a compilation of what needs to be secured to how to set up a successful security testing process. When it comes to internet of things security, the threat of breaches may never be fully eliminated, but the odds that enterprises will thwart attacks can be improved through proper policy and security systems.

     Continue Reading

  • Industrial Network Security

    In this excerpt from chapter 3 of Industrial Network Security, authors Eric D. Knapp and Joel Langill discuss the history and trends of industrial cybersecurity. Continue Reading

View All Manage

Problem Solve Network security Issues

We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.

View All Problem Solve