Network security
With the growth of malware and data breaches, enterprises must ensure their networks -- and the applications and traffic on those networks -- are secure. Learn about important network security strategies and technologies, such as VPNs, Secure Access Service Edge (SASE), zero trust and software-defined perimeter (SDP).
Top Stories
-
Feature
06 Feb 2023
How to fix the top 5 cybersecurity vulnerabilities
Check out how to fix the top five cybersecurity vulnerabilities to prevent data loss whether the problem is poor endpoint security, ineffective network monitoring or other issues. Continue Reading
-
Tip
31 Jan 2023
What cybersecurity consolidation means for enterprises
Experts predict cybersecurity consolidation will increase in the months and years ahead. Security leaders should consider what that means for their purchasing strategies. Continue Reading
-
Feature
06 Dec 2022
Wireless security: WEP, WPA, WPA2 and WPA3 differences
As wireless networks have evolved, so have the protocols for securing them. Get an overview of WLAN security standards, and learn the differences among WEP, WPA, WPA2 and WPA3. Continue Reading
-
Feature
30 Nov 2022
Evaluate various SASE approaches for deployment
Enterprises must choose between single- or multivendor SASE approaches, as well as DIY or managed service options. Experts suggest considering use cases to simplify SASE deployment. Continue Reading
-
News
18 Nov 2022
Cisco lays off staff, cuts office space in $600M restructuring
Cisco's shake-up will affect about 4,000 workers as the company doubles down on security, enterprise networking and its platform strategy. Continue Reading
-
News
01 Nov 2022
Cisco Networking Academy offers rookie cybersecurity classes
Cisco's cybersecurity track equips students for entry-level positions, including cybersecurity technician, junior cybersecurity analyst, and tier 1 help desk support role. Continue Reading
-
Feature
27 Oct 2022
Cloud, security and automation alter networking roles
Networking pros are no longer in their own bubbles, even if they prefer it that way. The growth of cloud, security and automation is expanding traditional networking roles. Continue Reading
-
Tip
24 Oct 2022
How to set up a VPN for enterprise use
VPNs are nearly ubiquitous, but does your organization know how to deploy one? Learn about use cases, requirements, deployment options and best practices for VPN deployment. Continue Reading
-
Feature
20 Oct 2022
VPN vs. zero trust vs. SDP: What's the difference?
For strong network security, many vendors say VPNs don't cut it anymore. Enter the zero-trust security model and SDPs. Continue Reading
-
Tip
19 Oct 2022
The future of VPNs in the enterprise
VPNs have been the workhorse of online connectivity. Enhancements to software and processing power in end devices will transform how companies use the technology going forward. Continue Reading
-
Tip
11 Oct 2022
What is zero-trust network access? ZTNA basics explained
Zero-trust network access is touted as the solution to replace the VPN. As the potential future of network security, learn more about ZTNA, including its benefits and challenges. Continue Reading
-
Feature
11 Oct 2022
How to choose the best ZTNA vendor for your organization
In a sea of options, finding the best ZTNA vendor for your organization can pose a major challenge. Weed through the marketing hype with advice from the experts. Continue Reading
-
Tip
04 Oct 2022
How to build a zero-trust network in 4 steps
While network teams are responsible for deploying the elements of a zero-trust network, security teams should also be involved in developing the overall zero-trust framework. Continue Reading
-
Opinion
21 Sep 2022
Planning the journey from SD-WAN to SASE
Enterprises need integrated security and networking frameworks to manage distributed IT environments and are looking to SD-WAN and security options like SASE to get the job done. Continue Reading
-
News
12 Jul 2022
Counterfeit scheme trafficked in $1 billion in Cisco gear
A Florida man has been charged with running a counterfeit operation that duped hospitals, schools, government agencies and the military. Continue Reading
-
News
20 Jun 2022
Cisco customers eager for Meraki's Catalyst management
IT professionals were excited to see cloud-based Meraki management for Catalyst switches but were less enthusiastic over the new Cisco Security Cloud. Continue Reading
-
Tip
20 Jun 2022
Review the components of VMware SASE Platform
VMware SASE Platform provides many strong networking and security capabilities, but it comes in an offering that feels like many individual products packaged together. Continue Reading
-
Tip
01 Jun 2022
How zero trust unifies network virtualization
The combination of zero trust and network virtualization creates opportunities to strengthen security policies, increase cross-domain collaboration and improve overall visibility. Continue Reading
-
Conference Coverage
01 Jun 2022
Cisco Live 2022 conference coverage, news and analysis
Cisco Live 2022, an in-person and online conference, highlights top networking trends. The five-day event also features keynote speeches and technical education sessions. Continue Reading
-
Tip
11 Apr 2022
Zero trust, wireless WAN affect the future of IoT networking
Zero-trust security models, wireless WAN evolution and the emergence of pop-up businesses are all helping to fuel innovation in IoT networking capabilities. Continue Reading
-
News
08 Apr 2022
Fortinet, Cato Networks add security for distributed SD-WANs
Fortinet updated FortiOS with an inline sandbox and a cloud access security broker. Cato has added new network access controls to its SASE service. Continue Reading
-
Tip
01 Apr 2022
The pros and cons of Netskope SASE
Netskope is undoubtedly a leader in the CASB market, but its limited security capabilities and lack of SD-WAN make Netskope an incomplete SASE offering. Continue Reading
-
Answer
29 Mar 2022
What is the role of machine learning in networking?
Incorporating machine learning tools into a network can help teams predict traffic flows, generate smarter analytics, monitor network health, tighten security measures and more. Continue Reading
-
Feature
24 Mar 2022
SecOps and cybersecurity basics for NetOps teams
To bridge the gap between NetOps and SecOps teams, network pros should know security fundamentals, including different types of attackers, attacks and available security services. Continue Reading
-
Tutorial
21 Mar 2022
NetOps vs. DevOps vs. NetSecOps: What's the difference?
DevOps, NetOps and NetSecOps ... oh my! These IT concepts have their differences, but at the end of the day, they're family. Here's how they relate. Continue Reading
-
News
18 Mar 2022
Startup OneLayer offers IoT security on cellular networks
Israeli startup OneLayer has launched from stealth with $8.2 million in seed funding and a software-based platform to secure IoT devices on private LTE and 5G networks. Continue Reading
-
Tip
15 Mar 2022
How to secure NetOps initiatives using Agile methodology
As more NetOps teams implement Agile methods, network and security testing must be part of a holistic approach that involves developers, networking and security teams working together. Continue Reading
-
Tip
09 Mar 2022
The rise of the NetOps engineer
The need for NetOps engineers with network automation and software development skills is rising with the continued drive to create more flexible networks. Find out what it takes. Continue Reading
-
News
25 Feb 2022
Arista embeds security software in campus switches
Arista Networks will embed network detection and response software in campus switches to provide AI-driven threat detection across the network. Continue Reading
-
Tip
25 Feb 2022
A review of Zscaler SASE architecture
Zscaler has a strong cloud-native architecture for secure internet access. But it doesn't deliver SD-WAN or converge internet access and WAN security, leaving it with only part of a SASE platform. Continue Reading
-
Answer
24 Feb 2022
CASB vs. SASE: What's the difference?
A cloud access security broker works within a Secure Access Service Edge architecture. Find out how CASB and SASE work together to improve network security. Continue Reading
-
News
15 Feb 2022
Juniper acquires zero-trust security startup WiteSand
Juniper has acquired zero-trust security company WiteSand. The startup's cloud-native technology could find a home in Juniper's Mist and SASE platforms. Continue Reading
-
News
09 Feb 2022
Palo Alto announces ML-enabled software update and firewalls
Palo Alto's updated PAN-OS software uses machine learning to analyze network traffic in real time, and two firewall appliances provide the processing power to support it. Continue Reading
-
News
01 Feb 2022
Cato Networks adds CASB to growing SASE portfolio
Cato Networks has added CASB app visibility and enforcement capabilities to its growing SASE portfolio, and plans to add data loss prevention in the coming months. Continue Reading
-
Feature
31 Jan 2022
Edge, public cloud, security drive network transformation
Networking is starting to reflect innovations in compute and public cloud. A notable change will be how network teams view networking and security as a holistic platform. Continue Reading
-
Tip
26 Jan 2022
Integrating zero-trust practices into private 5G networks
One of the first steps in deploying a technology is protecting it from potential security threats. Learn how to secure a private 5G network with zero-trust security practices. Continue Reading
-
Tip
18 Jan 2022
How to implement network segmentation for better security
For a network segmentation strategy to be effective and improve security, network teams need to create detailed security policies, identify each resource and use allowlists. Continue Reading
-
Tip
30 Dec 2021
Explore 9 essential elements of network security
Network security isn't a one-size-fits-all strategy. Dive into the various segments of network security, and learn how they overlap and interact with each other. Continue Reading
-
Infographic
28 Dec 2021
Review the major networking acquisitions of 2021
When a networking vendor announces plans to acquire another company, most people take notice. Explore which vendors made moves in 2021 and what those purchases mean. Continue Reading
-
Tip
17 Dec 2021
5 trends in enterprise networking that defined 2021
In 2020, enterprises shifted to remote work due to the pandemic. The trend continued in 2021, along with four other networking trends that defined the year and will extend into 2022. Continue Reading
-
News
01 Dec 2021
Palo Alto Networks and GTT to launch managed SASE platform
GTT Communications and Palo Alto Networks announced they will partner to offer a managed SASE platform using Prisma Access, Palo Alto's cloud-based security function. Continue Reading
-
Feature
23 Nov 2021
SecOps' need for traffic data drives NetSecOps collaboration
Security teams want to analyze network traffic data to identify anomalies and threats. As a result, network and security teams need to find ways to work together. Continue Reading
-
Tip
15 Nov 2021
How zero-trust SDP can work with a VPN for remote work
Implementing software-defined perimeter and zero-trust security models with a corporate VPN adds significant layers of user and device verification and authentication. Continue Reading
-
News
11 Nov 2021
AT&T launches a managed SASE offering with Cisco
AT&T aims its latest managed SASE service at enterprises using Cisco hardware. The offering's features range from firewall and secure web gateway functionality to DNS layer security. Continue Reading
-
Tip
04 Nov 2021
Evaluate the components of Cisco SASE
Cisco's SASE platform, Umbrella, has all the components of a SASE architecture, but it has a lot of integration complexity and a reliance on appliances. Continue Reading
-
Tip
29 Oct 2021
Use network standardization to facilitate automation
Network teams can automate and standardize network designs to improve configurations, simplify operations and more easily implement changes within their networks. Continue Reading
-
Answer
04 Oct 2021
Remote access vs. site-to-site VPN: What's the difference?
A remote access VPN connects remote users from any location to a corporate network. A site-to-site VPN, meanwhile, connects individual networks to each other. Continue Reading
-
Tip
21 Sep 2021
A review of Cato Networks' SASE Cloud platform
Cato's SASE Cloud lacks some features and may require customers to replace point products to fully benefit from the platform. But Cato aligns with SASE’s cloud-native vision and is a strong contender in the market. Continue Reading
-
Tip
11 Aug 2021
A deep dive into Fortinet's SASE platform
Despite its strong security foundation, Fortinet's SASE platform lacks a cloud-native strategy and requires teams to stitch the architecture together. Continue Reading
-
Answer
13 Jul 2021
The differences between PAP and CHAP
PAP uses a two-way handshake to authenticate client sessions, while CHAP uses a three-way handshake. Both authentication processes are common, but one is more secure. Continue Reading
-
Quiz
30 Jun 2021
12 official practice questions for the CCNA 200-301 exam
These practice questions for CCNA 200-301 lay out what readers need to know about network security and IP routing in the LAN, from 'CCNA 200-301 Official Cert Guide, Volumes 1 and 2.' Continue Reading
-
Feature
25 Jun 2021
How enterprises can close 5 major SASE gaps
Despite five major gaps that hamper SASE implementation, Gartner recommended enterprises should plan their migration timeline and aim to consolidate to a single vendor. Continue Reading
-
Answer
22 Jun 2021
How to use two VPN connections at the same time
Network managers and users might opt to set up two VPN connections at the same time, from the same remote device. But that might not be possible -- or safe. Continue Reading
-
Tip
11 Jun 2021
The pros and cons of Palo Alto Networks' SASE platform
Palo Alto Networks is commonly mentioned in SASE discussions. While the vendor has strong security capabilities, it also brings integration complexities and PoP limitations. Continue Reading
-
Tip
07 Jun 2021
How to pick the best network security service provider
Managed security service providers have different levels of expertise. Be sure to match your organization's security needs with the right network security provider. Continue Reading
-
News
02 Jun 2021
Microsoft buys ReFirm Labs to bolster IoT firmware security
Microsoft has bought ReFirm Labs in an IoT security play. The company said Refirm's open source-based products would help it address firmware vulnerabilities in IoT devices. Continue Reading
-
News
14 May 2021
Cisco's latest acquisition spree nabs three companies
Cisco's acquisitions, announced this week, would improve event hosting in Webex, boost network speeds for 5G, and enhance its security platform. Deal terms were not released. Continue Reading
-
Report
26 Apr 2021
SD-WAN explained: Ultimate guide to SD-WAN architecture
Evaluating SD-WAN architecture can be confusing, especially as the market grows. This guide helps IT pros learn SD-WAN basics, choose the best product and deploy it with confidence. Continue Reading
-
Tip
26 Apr 2021
8 remote access security risks and how to prevent them
Enterprises face myriad remote access security concerns, but training and clear communication can help them bolster their security programs for the long term. Continue Reading
-
Tip
23 Apr 2021
4 attributes key to network-as-a-service model
For a network-as-a-service model to work for the enterprise, it needs to offer four key attributes: an application-specific, elastic, secure and personalized VPN. Continue Reading
-
News
16 Apr 2021
Aruba product integrations advance its SASE strategy
Aruba's latest SASE-related integrations involve the Silver Peak-based SD-WAN, Threat Defense and the ClearPass Policy Manager. More product integrations are likely. Continue Reading
-
Tip
09 Apr 2021
Common network vulnerabilities and how to prevent them
It's not possible to eliminate all network vulnerabilities, but network teams can implement best practices to limit potential attacks and protect their networks. Continue Reading
-
Tip
08 Apr 2021
SASE options for the branch of one -- work from anywhere
More than ever, enterprises need to support individual employees that make up a branch of one. These setups require reliable connectivity, application performance and security. Continue Reading
-
Tip
02 Apr 2021
Best practices for VPN traffic monitoring
VPNs are still a critical part of many enterprise remote access strategies. Networks teams that monitor VPN traffic should look at factors like application usage and overhead. Continue Reading
-
Tip
01 Apr 2021
5 basic steps for effective cloud network security
In hybrid infrastructures, old network security systems won't work. Enterprises must adopt effective cloud network security strategies to keep their assets safe. Continue Reading
-
Feature
16 Mar 2021
The complete Secure Access Service Edge (SASE) guide
SASE helps organizations manage and secure external traffic. But is it the best choice for your environment? Find out how to buy, deploy and manage SASE in this adoption guide. Continue Reading
-
News
10 Mar 2021
News briefs: Koch Industries picks Alkira, Palo Alto
Koch industries combines Alkira networking and Palo Alto security for remote office connectivity; Cisco promotes three women on International Women's Day; AT&T, Fortinet partner. Continue Reading
-
Guest Post
08 Mar 2021
Enterprise edge is telecom operators' new frontier
Network operators have an opportunity to sell new bundles of dynamic enterprise edge services that include SASE, SD-WAN and virtual security if they size it and price it well. Continue Reading
-
Tip
26 Feb 2021
5 steps to conduct network penetration testing
Enterprises that want to ensure competent network security strategies should look at how they can implement penetration testing, considering red teams and physical pen tests. Continue Reading
-
Feature
25 Feb 2021
Get started with network penetration testing for beginners
Authentication, patching and configuration are among the most common vulnerabilities found through network penetration testing. Learn more in this free chapter excerpt. Continue Reading
-
Feature
25 Feb 2021
Advice on how to learn network penetration testing skills
As beginners learn network penetration testing skills, they should remember these expert tips: Pay attention to what the client wants, and stick to offense, not defense. Continue Reading
-
Feature
23 Feb 2021
3 SASE case studies exploring real-world deployments
Three case studies demonstrate how SASE technology helps organizations securely connect geographically distributed workforces. Continue Reading
-
News
17 Feb 2021
Palo Alto to buy Checkov creator, Bridgecrew
Palo Alto said it will acquire Bridgecrew, the developer of the static code analysis tool Checkov. DevOps teams use the open source tool to build cloud applications. Continue Reading
-
Tip
16 Feb 2021
7 steps for a network and IT security foundation
Enterprises should make it a habit to review their IT security systems, following steps that include network segmentation, multifactor authentication and security education. Continue Reading
-
Feature
12 Feb 2021
SASE market emerges and grows as the 'wave of the future'
Secure Access Service Edge is the latest technology to garner industry buzz in networking and security. Although it's still relatively new, the technology is making waves. Continue Reading
-
Tip
08 Feb 2021
How to secure remote access for WFH employees in 4 steps
The global pandemic caused mayhem on network security environments. Enterprises need to bring rigor back to their systems and tighten security for remote workers. Continue Reading
-
News
04 Feb 2021
Arista launches zero-trust security with a Forescout option
Arista's zero-trust security framework segments devices into groups and sets policies for network access. Forescout integration is available for dynamic device identification. Continue Reading
-
Tip
02 Feb 2021
SASE hype includes SD-WAN, but does it need to?
Much of the hype around Secure Access Service Edge features the importance of SD-WAN with SASE, but do the two need each other to thrive? Research says probably not. Continue Reading
-
Tip
01 Feb 2021
How to monitor home network traffic for added security
When addressing home network monitoring, track all connected devices, and take advantage of open source tools, like packet capture, to sniff out malicious traffic. Continue Reading
-
Tip
29 Jan 2021
How the SolarWinds vulnerability affects networking
The SolarWinds attack resulted in a bevy of network vulnerabilities, like masked traffic and backdoor access. Network teams should take the time to review their security strategies. Continue Reading
-
Feature
22 Jan 2021
SolarWinds: Lessons learned for network management, monitoring
In this roundup of networking blogs, experts reveal the critical lessons learned from the SolarWinds hack in regard to network management and monitoring capabilities. Continue Reading
-
Tip
20 Jan 2021
10 network security tips in response to the SolarWinds hack
From perimeter protection to persistent patching, enterprises should regularly review, update and test their network security plans, especially in response to the SolarWinds hack. Continue Reading
-
Tip
15 Jan 2021
Considerations for SASE management and troubleshooting
SASE opens new territory for network and security management and troubleshooting. Ultimately, teams should look for system usability and visibility into traffic flows and policies. Continue Reading
-
Tip
14 Jan 2021
SASE challenges include network security roles, product choice
Secure Access Service Edge blends network and security functions. While this integration has its benefits, enterprises still need to address some SASE challenges. Continue Reading
-
Tip
12 Jan 2021
How to calculate SASE return on investment and costs
SASE return on investment will vary for each organization, depending on use cases and architecture requirements. But the metrics used to determine ROI and cost factors are the same. Continue Reading
-
Tip
07 Jan 2021
Top 5 SASE use cases balance network connectivity, security
Secure Access Service Edge can enhance network performance and security controls for remote sites. Discover some of the other top SASE use cases and deployment options. Continue Reading
-
Feature
30 Dec 2020
5 networking startups helping enterprises adapt and prepare
Even in a global pandemic, these five networking startups continue to impress. Learn how their innovative technologies can help enterprises prepare for unforeseen challenges. Continue Reading
-
Feature
21 Dec 2020
Top network attacks of 2020 that will influence the decade
You've heard of phishing, ransomware and viruses. Now, keep them in mind because one cybersecurity expert says these threats and more may cause IT headaches for the next decade. Continue Reading
-
Feature
21 Dec 2020
Advice for an effective network security strategy
Security audits, evaluations of tools and looking realistically at trending technologies are some ways an organization can ensure its network security is the best it can be. Continue Reading
-
Quiz
21 Dec 2020
Test your network threats and attacks expertise in this quiz
Network security is an ever-changing subject, but many of its common threats have plagued IT pros for years -- and will likely continue to do so. See what you know in this quiz. Continue Reading
-
Tip
14 Dec 2020
How SASE convergence affects network and security roles
Most enterprises have siloed departments, but SASE's convergence of network and security functions could disrupt those constructs and drive more communication between teams. Continue Reading
-
Tip
11 Dec 2020
Software-defined home offerings drive remote productivity
Say hello to software-defined home, a 'branch of one' package that combines professional-grade Wi-Fi, security, SD-WAN and centralized management for remote workers. Continue Reading
-
Tip
20 Nov 2020
Implementing an SDP architecture for added network security
A key component of a software-defined perimeter requires client authentication before connection, while also making a network's internals invisible to outsiders. Continue Reading
-
Answer
11 Nov 2020
How do VPN vs. cloud services compare for remote work?
As remote work becomes increasingly normal, IT teams must decide which remote access technologies will benefit employees more. VPN and cloud services are two top choices. Continue Reading
-
Tip
02 Nov 2020
Why networks should apply security by design principles
Security by design incorporates security and risk management directly into network architecture, using segmentation and Agile infrastructure design. Continue Reading
-
Tip
29 Oct 2020
The top 5 benefits of SASE to enhance network security
A cloud-based distributed architecture, centralized management and endpoint-specific security policies are just some of the benefits of Secure Access Service Edge. Continue Reading
-
Tip
19 Oct 2020
How to ensure a scalable SASE architecture
Don't assume all SASE architecture is the same, especially when it comes to scalability. Enterprises should consider distance to vendor PoPs, office locations and agent onboarding. Continue Reading
-
Opinion
12 Oct 2020
What are some VPN alternatives for remote access?
VPN security has its imperfections, especially when tracking user data and online activity. Some VPN alternatives may provide different security elements for users. Continue Reading
-
Answer
05 Oct 2020
How a network segmentation strategy works with SD-WAN
Legacy segmentation techniques are often unwieldy. But, as enterprises contemplate network segmentation with SD-WAN, they must understand their network environments and goals. Continue Reading
-
News
02 Oct 2020
Cisco to acquire container security specialist Portshift
Cisco's acquisition of Israeli startup Portshift would add essential security tools for companies that use the Kubernetes system for deploying cloud-native applications. Continue Reading
-
Answer
02 Oct 2020
What does a VPN concentrator do?
As more employees work remotely and VPN use rises, VPN concentrators have become trendy. But what does a VPN concentrator do exactly, and how do you deploy one? Continue Reading
-
Tip
28 Sep 2020
5G network security concerns and how to prepare for them
Enterprises looking forward to deploying 5G must first assess their security concerns upfront and review their policies and procedures, despite 5G's security improvements. Continue Reading