Perimeter security News
September 21, 2017
Verizon expands its enterprise portfolio with managed SDP security, underpinned with Vidder software. Also, InfoVista and Cato Networks combine services for an SD-WAN gateway.
March 28, 2017
This week, bloggers look into load-balancer performance, congressional changes to ISP rules and software-defined perimeters.
February 23, 2017
Google restructured its network security with the BeyondCorp program and wants to show other organizations how to move past firewalls.
July 15, 2016
You can't hang a "Do not disturb" sign on a mobile device. But users want their privacy when it comes to working on smartphones and tablets. IT must figure out how to balance their personal privacy with the ability to secure corporate apps and data on those devices. In this month's cover story, editor in chief Colin Steele dives into the issue of privacy in the mobile age.
For the strongest mobile security, IT shops should take a layered approach, says columnist Eric Klein this month. Another column looks at why IT should make data storage and processing a priority in their mobility strategy. Plus, one of the newest ways to deliver and manage mobile resources is through workspaces -- an emerging technology that Jack Madden explains in depth. Finally, we recap the Best of Citrix Synergy Awards winners from this year's conference.
Perimeter security Get Started
Bring yourself up to speed with our introductory content
The notion of a defensible security perimeter is outmoded, but that doesn't mean the goal of IT security is unattainable. Laying on defenses is what's needed now. Continue Reading
Compare a traditional network perimeter configuration with cloud cybersecurity and see if this new kind of security platform can improve your business continuity. Continue Reading
Organizations must figure out how to secure data transmission to and from the IoT devices connecting to their networks. PKI can help. Continue Reading
Evaluate Perimeter security Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
IoT can be a strong component to ensure compliance with privacy regulations, creating a contextual perimeter for your data and your organization. Continue Reading
When it comes to mobile security, there is no one way to do things, but there are best practices to follow. A multi-tiered approach is a great place to start. Continue Reading
In this webcast, data security expert Georgia Weidman discusses how changing network perimeters create numerous complications for enterprise cybersecurity strategies. Continue Reading
Manage Perimeter security
Learn to apply best practices and optimize your operations.
Mobile information management and mobile security should be considered top investment priorities, mobility consultant Bob Egan explains. Continue Reading
Regular vulnerability scans can close holes in the IT security perimeter when paired with a regimented Windows Server patching process. Continue Reading
Data protection rules not only help keep companies regulatory compliant, but can also improve network security -- and maybe even the bottom line. Continue Reading
Problem Solve Perimeter security Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Maintaining content security in your organization's CMS requires a delicate balance between security and usability. Learn about best practices for managing access to your content. Continue Reading
Cybersecurity defense in depth needs to learn from the military strategy it originated from. Expert Peter Sullivan explains where cybersecurity should not deviate. Continue Reading
According to expert Gary McGraw, you're not helping yourself by believing the things -- all seven of them -- you've heard about secure software development. Continue Reading