NEWS: NETWORK WORLD SECURITY
Setup News Ticker
   NEWS: NETWORK WORLD SECURITY
Network World Security
Mar 14, 2023

DNS data shows one in 10 organizations have malware traffic on their networks
Akamai report highlights how widespread malware threats remain, noting the dangers of threats specific to DNS infrastructure.

Network World Security
Mar 10, 2023

AT&T informs 9M customers about data breach
The company's marketing vendor suffered a security failure in January and exposed CPNI data that included first names, wireless account numbers, wireless phone numbers, and email addresses.

Network World Security
Mar 10, 2023

Attacks on SonicWall appliances linked to Chinese campaign: Mandiant
The technique used in the attack on SonicWall devices are consistent with earlier attacks from a Chinese campaign.

Network World Security
Mar 09, 2023

Aruba to prioritize SASE, private 5G, data-center networking
Aruba Networks plans to prioritize development of a short list of key networking technologies - including data-center switching, private 5G, and secure access service edge (SASE) - that it finds are top of mind for enterprise customers.

Hewlett Packard Enterprise's network subsidiary is fresh off a successful first quarter that saw revenue climb 31% year over year. Aruba general manager Phil Mottram attributes the record revenue in large part to the company's Intelligent Edge strategy, which includes technologies to help customers adopt and manage network and application resources.

To read this article in full, please click here



Network World Security
Mar 07, 2023

VMware overhauls Workspace One for better performance
VMware has revamped its Workspace One mobile and virtual desktop platform by boosting performance, making it more service-oriented and easy to manage.

Workspace One is VMware's endpoint-management package for delivering, managing and securing application access to any device across the a cloud or distributed on-premises enterprise. The highly-integrated suite includes device management, single sign-on, remote access control, endpoint security, analytics, automation and virtualization.

The company workers usin and accessing applications from multiple devices prompted the over-arching need to change Workspace One and how its services are delivered.

To read this article in full, please click here



Network World Security
Mar 07, 2023

Fortinet adds new security, management features to its SASE platform
UNDER EMBARGO UNTIL TUESDAY, MARCH 7 AT 9AM ET

Fortinet has added features that broaden the range of management and security tools for its secure access service edge (SASE) package.

The company has added a feature to its Secure Private Access that ties SASE resources together with SD-WAN-based applications through a Fortinet SD-WAN hub located in a nearby point-of-presence (PoP). The idea is to support larger hybrid environments and simplify anywhere access to corporate applications, said Nirav Shah, vice president of products with Fortinet.

To read this article in full, please click here



Network World Security
Mar 07, 2023

Akamai releases new threat hunting tool backed by Guardicore capabilities
Akamai Hunt combines the company's historic DNS, WAF, and DDoS data with Guardicore's segmentation and telemetry to detect and eliminate evasive threats.

Network World Security
Mar 07, 2023

What is zero trust? A model for more effective security
As the security model becomes the preferred security strategy, it's worth looking at what it is and what it takes to achieve.

Network World Security
Mar 06, 2023

Royal Caribbean adopts Zero Trust on land and sea
The name Royal Caribbean conjures up images of luxury cruise ships, top-notch entertainment, fine dining, sandy beaches, breathtaking sunsets, tall tropical beverages.

"Our mission is to create fabulous vacations with great experiences and great memories for our crew and our guests," says John Maya, vice president of operational excellence at Miami-based Royal Caribbean Group.

Beyond the glitz and glamour, however, Royal Caribbean has the same internal systems as any company in the travel/hospitality industry - corporate offices, sales, marketing, reservations, call centers, baggage handling, etc.

Maya describes his IT infrastructure as hybrid cloud, with some resources hosted on Amazon AWS and Microsoft Azure, but also some core systems, such as the mission critical reservations application, running on an IBM AS-400 server in an Equinix data center in Virginia.

To read this article in full, please click here



Network World Security
Mar 03, 2023

HPE to acquire Axis Security to deliver a unified SASE offering
HPE plans to expand its Aruba SASE platform with Axis Security's Atmos, delivering a comprehensive edge-to-cloud, network and security solution as a service.

Network World Security
Mar 02, 2023

IBM partners up with Cohesity for better data defense in new storage suite
IBM and data security and backup provider Cohesity have formed a new partnership, calling for Cohesity's data protection functionality to be incorporated into an upcoming IBM storage product suite, dubbed Storage Defender, for better protection of end-user organizations' critical information.

The capabilities of Cohesity's DataProtect backup and recovery product will be one of four main feature sets in the Storage Defender program, according to an announcement from IBM Thursday.

The Storage Defender suite is designed to bring together IBM and third-party products in order to unify primary, secondary replication, and backup management, said IBM. It's an as-a-service offering that features a single-pane-of-glass interface, SLA-driven policy automation and the ability to work with a wide variety of data sources, including physical storage, cloud hypervisors, and an assortment of different database types.

To read this article in full, please click here



Network World Security
Mar 02, 2023

Unpatched old vulnerabilities continue to be exploited: Report
The top five exploited vulnerabilities in 2022 include several high-severity flaws in Microsoft Exchange, Zoho ManageEngine products, and virtual private network solutions from Fortinet, Citrix and Pulse Secure.

Network World Security
Mar 01, 2023

IBM's mainframe operating system upgrade will embrace AI
IBM said this week it will soon roll out an AI-infused, hybrid-cloud oriented version of its z/OS mainframe operating system.

Expected in the third quarter, z/OS 3.1 will  support technologies intended to enable deployment of AI workloads co-located with z/OS applications, IBM said in a customer preview letter.

The new OS will work best with the newest version of the Big Iron, the z16, but it will support z14 models and above, IBM says.

The z16 includes an AI accelerator built onto its core Telum processor that can do 300 billion deep-learning inferences per day with one millisecond latency and includes what IBM calls a quantum-safe system to protect organizations from anticipated quantum-based security threats.

To read this article in full, please click here



Network World Security
Feb 27, 2023

War tests Ukrainian telecom, internet resilience
One year after Russia's invasion of Ukraine, the country's overall resilience and defiance has been inspiring, but telecommunications and internet connectivity has grown much more difficult.

Initially the country's internet network mostly withstood with some outages and slowdowns, but that has changed over time as the aggressors devote more effort in destroying physical locations and deploying malware and other cybersecurity weapons.

For example, researchers at Top10VPN recently reported some distressing analysis including:

To read this article in full, please click here



Network World Security
Feb 24, 2023

Edgio adds advanced DDoS protection with other WAAP enhancements
The CDN provider's new DDoS scrubbing offering impersonates the customer's network to phase out malicious traffic, and employs advanced IP masking at source to prevent direct-to-origin attacks.

Network World Security
Feb 22, 2023

Cyberattacks hit data centers to steal information from global companies
A malicious campaign against data centers stole the access credentials of some of the world's biggest companies — including Amazon, Apple, Goldman Sachs, and Microsoft — according to reports.

Network World Security
Feb 17, 2023

New Mirai botnet variant V3G4 targets Linux servers, IoT devices
The new V3G4 variant of Mirai, which creates botnets for DDoS attacks, exploited 13 different vulnerabilities in three campaigns over a six-month period, Palo Alto Network's Unit 42 team reports.

Network World Security
Feb 13, 2023

Cisco observability: What you need to know
Observability may be the latest buzzword in an industry loaded with them, but Cisco will tell you the primary goal of the technology is to help enterprises get a handle on effectively managing distributed resources in ways that have not been possible in the past.

The idea of employing observability tools and applications is a hot idea. Gartner says that by 2024, 30% of enterprises implementing distributed system architectures will have adopted observability techniques to improve digital-business service performance, up from less than 10% in 2020.

"Today's operational teams have tools for network monitoring, application monitoring, infrastructure monitoring, call monitoring, and more, but they rarely intermingle to provide a cohesive view of what's going on across the enterprise," according to Carlos Pereira, Cisco Fellow and chief architect in its Strategy, Incubation & Applications group.

To read this article in full, please click here



Network World Security
Feb 13, 2023

Network-as-a-service lets a shoe retailer take steps toward Zero Trust
Nigel Williams-Lucas, director of Information Technology at Maryland-based footwear retailer DTLR, faced a challenge that most IT execs will recognize: the business was pushing hard on digital transformation, and the IT infrastructure was struggling to keep pace.

Store managers were seeking better data analytics and business intelligence from backend systems like inventory and sales. The business wanted IT systems to support customers ordering online and picking up at a physical store within two hours.

The network needed to securely support real-time, bandwidth-intensive IP security cameras. And Williams-Lucas wanted to roll out beaconing technology, in which the network gathers information about customer in-store activity via Bluetooth or Wi-Fi, and can send discount offers to a customer's phone based on where they are in the store and what they appear to be interested in.

To read this article in full, please click here



Network World Security
Feb 09, 2023

VMware ESXi server ransomware evolves, after recovery script released
After the FBI and CISA on Wednesday released a recovery script for organizations affected by a massive ransomware attack targeting VMWare ESXi servers worldwide, reports surfaced that the malware evolved in a way that made earlier recovery procedures ineffective.

The attacks, aimed at VMware's ESXi bare metal hypervisor, were first made public February 3 by the French Computer Emergency Response Team (CERT-FR), and target ESXi instances running older versions of the software, or those that have not been patched to current standards. Some 3,800 servers have been affected globally, CISA and the FBI said.

To read this article in full, please click here



Network World Security
Feb 08, 2023

Extreme adds network fabric support to its SD-WAN
Extreme Networks has added network fabric capabilities to its flagship SD-WAN platform to enable customers to link and manage distributed resources more securely.

Additional enhancements to the ExtremeCloud SD-WAN platform include improved automated workflows and direct connectivity to cloud systems such as Microsoft Azure and AWS.

"The overarching idea is to help customers more effectively connect distributed sites, especially the smaller branch office, without increasing optical or management overhead," said Rob Hull, product marketing director at Extreme. "For the smaller sites, especially, with maybe no IT person or few, it gives them the big-site quality-of-service feel and big-site centralized management capability."

To read this article in full, please click here



Network World Security
Feb 07, 2023

Cisco security upgrades strengthen access control, risk analysis
Cisco has strengthened some of its key security software packages with an eye toward better protecting distributed enterprise resources.

Specifically, Cisco added more intelligence to its Duo access-protection software and introduced a new application called Business Risk Observability that can help enterprises measure the impact of security risks on their core applications. The company also enhanced its SASE offering by expanding its SD-WAN integration options.

To read this article in full, please click here



Network World Security
Feb 07, 2023

MKS Instruments falls victim to ransomware attack
The semiconductor equipment maker reported the ransomware incident just a day after national cybersecurity agencies and security experts around the world warned about a global ransomware attack that hit thousands of servers running on VMware ESxi.

Network World Security
Feb 06, 2023

Massive ransomware attack targets VMware ESXi servers worldwide
Cybersecurity agencies globally, including in Italy, France, the US and Singapore have issued alerts about a ransomware attack targeting the VMware ESXi hypervisor.Aourva

Network World Security
Feb 06, 2023

Fortinet unveils custom ASIC to boost firewall performance, efficiency
Fortinet is introducing a new ASIC that promises to meld the security and network functions of its core family of FortiGate firewalls more efficiently and powerfully.

The custom chip is 7-nanometer package, called fifth-generation security processing system or FortiSP5, that promises a number of performance improvements for the FortiGate system. It enables 17x faster firewall performance and 32x faster encryption processes while using 88% less power compared to standard CPUs, according to John Maddison, executive vice president of products and CMO at Fortinet. With FortiSP5, Fortinet's firewalls will be able to handle higher levels of traffic inspection to block threats and boost protection, according to the vendor.

To read this article in full, please click here



Network World Security
Feb 06, 2023

OPSWAT mobile hardware offers infrastructure security for the air gap
A new, tablet-sized media scanner boasts a wide range of capabilities for critical infrastructure defense.

Network World Security
Feb 02, 2023

NTT, Palo Alto partner for managed SASE with AIOps
A new offering from IT services provider NTT combines Palo Alto Networks' Prisma SASE offering with NTT's managed network services and AIOps infrastructure.

SASE - secure access service edge - has been gaining interest for its potential to reduce networking complexity while improving security. It combines SD-WAN with security services, including secure web access gateway (SWG), cloud access security broker (CASB), zero-trust network access (ZTNA), and firewall-as-a-service (FWaaS), in a single, cloud-delivered service model.

To read this article in full, please click here



Network World Security
Feb 02, 2023

Enterprises turn to single-vendor SASE for ease of manageability
Before the start of the Covid epidemic, a traditional WAN architecture with centralized security worked well for Village Roadshow. "Advanced security inspection services can be applied, firewalls can provide separation, and a demilitarized zone can be implemented," said Michael Fagan, chief transformation officer at Village Roadshow, the largest theme park owner in Australia.

But it required backhauling traffic from remote sites to a data center or hub for security inspection, which can hurt application performance, create a poor user experience, and cost the company in productivity, he said.

When the pandemic led the company to transition to a hybrid workforce, with most people working from home or from a remote site, it prompted Village Roadshow to rethink its network and security approach.

To read this article in full, please click here



Network World Security
Feb 01, 2023

Misconfiguration and vulnerabilities biggest risks in cloud security: Report
About 87% of container images include a high or critical vulnerability, while 90% of granted permissions are not used, according to cybersecurity firm Sysdig.

Network World Security
Jan 23, 2023

Nvidia targets insider attacks with digital fingerprinting technology
A new AI-based system from Nvidia sniffs out unusual behavior and ties it to users, in an effort to prevent insider attacks and protect digital credentials.

Network World Security
Jan 20, 2023

Pros and cons of managed SASE
AmerCareRoyal, which provides disposable products for the food service and hospitality industries, is the product of six mergers and acquisitions over the past several years, and its former network security setup couldn't keep up.

Jeff DeSandre, who joined the company as CIO in 2019, wanted an SD-WAN platform that came with more advanced management options and firewalls. After looking at the market, he added threat detection and response capabilities to his wish list. "I was focused on getting our arms quickly around our wide area network and securing our edge, and then making sure that the solution I went with could scale to my long-term roadmap," he says.

To read this article in full, please click here



Network World Security
Jan 19, 2023

Survey: NetOps is essential but undervalued in making multi-cloud decisions
By 2024, 88% of enterprises will use two or more infrastructure as a service (IaaS) providers, according to research by EMA, which believes that network infrastructure and operations teams must take a leadership role in defining network architecture that ensures the performance and security of their multi-cloud digital services.

EMA recently polled a group of these enterprises, surveying 351 IT stakeholders, including 39% in network engineering, 21% in the CIO suite, 15% on cloud teams, and 11% in cybersecurity.

EMA found that networking teams and network technology have become more important in 81% of multi-cloud strategies in recent years. Unfortunately, only 24% of research participants firmly believe that their networking teams have enough influence over cloud decision-making.

To read this article in full, please click here



Network World Security
Jan 18, 2023

QuSecure launches quantum-computing based security for endpoints
Quantum-based security with what's advertised as "frictionless" deployment is now available from QuSecure.

Network World Security
Jan 17, 2023

Remote.it takes steps toward zero trust with 'single line of code' provisioning
New integration with Okta, containerization support and a tagging system are all present in the latest version of Remote.it's network management platform.

Network World Security
Jan 13, 2023

What to expect from SASE certifications
Secure access service edge (SASE) is a network architecture that rolls SD-WAN and security into a single, centrally-managed cloud service that promises simplified WAN deployment, improved security, and better performance.

According to Gartner, SASE's benefits are transformational because it can speed deployment time for new users, locations, applications, and devices, as well as reduce attack surfaces and shorten remediation times by as much as 95%.

With the pandemic, adoption of SASE has been on an upward swing. Gartner predicts in its most recent SASE roadmap that 80% of enterprises will have adopted a SASE or SSE architecture by 2025, up from 20% in 2021. (Security service edge, or SSE, is a security-focused subset of SASE that's basically SASE without SD-WAN.)

To read this article in full, please click here



Network World Security
Jan 12, 2023

8 hot networking technologies for 2023
Despite the challenges posed by economic turmoil, epidemics, and political upheaval, network researchers are continuing to blaze new trails in innovation, performance, management, and security. In sum, 2023 is shaping up as a year of network evolution and transformation.

Here are eight network technologies you will want to pay particularly close attention to.

1. Unified SASE: Addresses hybrid workforce, hybrid clouds Unified Secure Access Service Edge (SASE) tightly integrates security and networking into a single platform. The technology uses a single-pass scanning architecture combined with a unified policy that's configured via a unified console that draws from a unified data lake. "This is significant for organizations to continue to provide a consistent and assured user experience while protecting users, devices, sites, and data amid the rapidly evolving dynamics coming in 2023," says Kelly Ahuja, CEO of networking and cybersecurity firm Versa Networks.

To read this article in full, please click here



Network World Security
Jan 10, 2023

Intel boosts VM security, guards against stack attacks in new Xeon release
Intel's TDX framework gains a new capability, and a "shadow stack" in Xeon's fourth generation aims to knock out a dangerous cyberattack method.

Network World Security
Jan 09, 2023

Work from home is here to stay, so how should IT adjust?
The pandemic has changed how we work, probably forever. Most employees with jobs that can be done effectively from home have no intention of returning full time to the office. They find that their work-life balance is much more balanced without the long commutes and constant interruptions that accompany office work.

According to a McKinsey/Ipsos survey, 58 percent of American workers had the opportunity to work from home at least one day a week in 2022, while 38 percent were not generally required to be in the office at all.

To read this article in full, please click here



Network World Security
Jan 06, 2023

Former VMware exec Gillis resurfaces to run Cisco security business (again)
Industry veteran Tom Gillis, who left VMware in December, has returned to Cisco in a new but familiar role: senior vice president and general manager of Cisco's Security Business Group. 

From 2007 to 2011, Gillis was vice president and general manager of Cisco's then-called Security Technology Group, which focused on developing network, content and identity management products.

After that, Gillis founded cloud computing firm Bracket Computing, which was acquired by VMware in May 2018.

Gillis ran VMware's $2 billion networking and security business from that point until this past December, and he was responsible for a number of its core products, including VMware's NSX networking and network/edge software products. 

To read this article in full, please click here



Network World Security
Dec 26, 2022

Looking ahead to the network technologies of 2023
What's the single most important thing that enterprises should know about networking in 2023? Forget all that speeds-and-feeds crap you hear from vendors. The answer is that networking is now, and forever, linked to business applications, and those applications are linked now to the way that we use the Internet and the cloud. We're changing how we distribute and deliver business value via networking, and so network technology will inevitably change too, and this is a good time to look at what to expect.

Growth in Internet dependence First, the Internet is going to get a lot better because it's going to get a lot more important. It's not just that the top-end capacities offered will be raised, in many cases above 2 Gbps. Every day, literally, people do more online, and get more interactive, dynamic, interesting, websites to visit and content to consume. Internet availability has been quietly increasing, and in 2023 there will be a significant forward leap there, in large part because people who rely on something get really upset when it's not working.

To read this article in full, please click here



Network World Security
Dec 26, 2022

The top 12 tech stories of 2022
The year highlighted how vulnerable the technology sector is to the vagaries of geopolitics and the macroeconomy, as IT giants laid off workers, regulators cracked down on tech rule-breakers, nations negotiated data security regulations, the US-China chip war widened, and the Ukraine war disrupted business as usual.

Network World Security
Dec 22, 2022

What is Zero Trust Network Architecture (ZTNA)?
Zero Trust is a term coined by John Kindervag while he was an analyst at Forrester Research to describe a strategic framework in which nothing on the network is trusted by default - not devices, not end users, not processes. Everything must be authenticated, authorized, verified and continuously monitored.

The traditional approach to security was based on the concept of "trust, but verify." The weakness of this approach is that once someone was authenticated, they were considered trusted and could move laterally to access sensitive data and systems that should have been off-limits.

Zero Trust principles change this to "never trust, always verify." A Zero Trust architecture doesn't aim to make a system trusted or secure, but rather to eliminate the concept of trust altogether. Zero Trust security models assume that an attacker is present in the environment at all times. Trust is never granted unconditionally or permanently, but must be continually evaluated.

To read this article in full, please click here



Network World Security
Dec 16, 2022

Data center networking trends to watch for 2023
Hybrid and multicloud initiatives will continue to shape enterprise IT in 2023, and the impact on data-center networking will be felt across key areas including security, management, and operations. Network teams are investing in technologies such as SD-WAN and SASE, expanding automation initiatives, and focusing on skills development as more workloads and applications span cloud environments.

"The most important core trend in data centers is the recognition that the hybrid cloud model - which combines current transaction processing and database activities with a cloud-hosted front-end element for the user interface - is the model that will dominate over time," said Tom Nolle, president of CIMI Corp. and a Network World columnist. The industry is seeing a slow modernization of data center applications to support the hybrid-cloud model, Nolle says, "and included in that is greater componentization of those applications, a larger amount of horizontal traffic, and a greater need to manage security within the hosted parts of the application."

To read this article in full, please click here



Network World Security
Dec 15, 2022

F5 expands security portfolio with App Infrastructure Protection
AIP goes one step further from API security and provides telemetry collection and intrusion detection for cloud-native workloads.

Network World Security
Dec 13, 2022

Ransomware: It's coming for your backup servers
Backup and recovery systems are at risk for two types of ransomware attacks: encryption and exfiltration - and most on-premises backup servers are wide open to both. This makes backup systems themselves the primary target of some ransomware groups, and warrants special attention.

Hackers understand that backup servers are often under-protected and administered by junior personnel that are less well versed in information security. And it seems no one wants to do something about it lest they become the new backup expert responsible for the server. This is an age-old problem that can allow backup systems to pass under the radar of sound processes that protect most servers.

To read this article in full, please click here



Network World Security
Dec 12, 2022

Top 10 Best Residential Proxy Service Providers
The need to surf the internet freely without restrictions or being noticed created the necessity for proxies. So, what is a proxy? To put it in simple terms, a proxy is a device that provides a gateway between users and the web. Therefore, it helps prevent cyber attackers from gaining access to a private network.

A proxy is a computer, referred to as an intermediary because it channels traffic between end-users and the web content they visit online. In data gathering, proxies enable you to access data from websites without being detected, increasing the success rate of extracting valuable information.

Top 10 Best Residential Proxy Service Providers Several residential proxy providers claim to provide the ultimate security for your web activities and enable you to browse anonymously. However, some providers' services don't come close to what they claim to provide. Having stated that, the following providers will give you value for your money. If you need a reliable residential proxy, they will come to the rescue.

To read this article in full, please click here



Network World Security
Dec 12, 2022

What is SASE? A cloud service that marries SD-WAN with security
Secure Access Service Edge (SASE) is a network architecture that combines software-defined wide area networking (SD-WAN) and security functionality into a unified cloud service that promises simplified WAN deployments, improved efficiency and security, and application-specific bandwidth policies.

First outlined by Gartner in 2019, SASE (pronounced "sassy") has quickly evolved from a niche, security-first SD-WAN alternative into a popular WAN sector that analysts project will grow to become a $10-billion-plus market within the next couple of years.

To read this article in full, please click here



Network World Security
Dec 06, 2022

Ransomware attack knocks Rackspace's Exchange servers offline
Cloud services and hosting provider Rackspace Technology acknowledged Tuesday that a recent incident that took most of its Hosted Exchange email server business offline was the product of a ransomware attack. The company shut the service down last Friday.

It was not, initially, clear what had caused the outage, but Rackspace quickly moved to shift Exchange customers over to Microsoft 365, as this part of the company's infrastructure was apparently unaffected.

Rackpsace offers migration to Microsoft 365 Rackspace said today that there is "no timeline" for a restoration of Exchange service, but it is offering Exchange users technical assistance and free access to Microsoft 365 as a substitute, though it acknowledged that migration is unlikely to be a simple process for every user. Rackspace said that, while the migration is in progress, customers can forward email sent to their Hosted Exchange inboxes to an external server, as a temporary workaround.

To read this article in full, please click here



Network World Security
Dec 06, 2022

12 killer (and free) tools for network engineers
The job of a network engineer just keeps getting more complicated. Mission critical applications are competing for bandwidth. The sheer number of devices is exploding, driven by IoT. And the network itself if being extended to the cloud, the edge and to the home office.  

And then there's cybersecurity to worry about. Attacks are on the rise across the board, and attackers are constantly looking for vulnerabilities or backdoors, upping the need for solid and secure networking to act as an early warning system for cybersecurity defenses.

Thankfully, there are many great tools available to help network engineers complete their never-ending tasks. And many of them are available for free. Here's our list of 12 killer network tools that won't break the bank. 

To read this article in full, please click here



Network World Security
Dec 01, 2022

Researchers found security pitfalls in IBM's cloud infrastructure
A demonstrated attack by cybersecurity researchers in IBM's cloud infrastructure allowed them access to the internal server used to build database images for customer deployments.

Network World Security
Nov 29, 2022

5 DNS services to provide a layer of internet security
Having thorough IT security usually means having a layered approach. Basic antivirus, for instance, might catch PC-based malware once a user downloads it, but you could try to block it before it ever reaches the user device, or at least have another security mechanism in place that might catch it if the basic antivirus doesn't. DNS-based filtering can do this! It can help stop users from browsing to malware and phishing sites, block intrusive advertising to them, and serve as adult content filters.

First, a quick primer for those who are unfamiliar with DNS: You utilize the Domain Name System (DNS) every time you surf the Web. Each time you type a site name into the browser, DNS is queried for the IP address corresponding to that particular domain, so the browser can contact the Web server to get the content. The process of converting the domain name to its IP address is called domain-name resolution.

To read this article in full, please click here



Network World Security
Nov 22, 2022

Microsoft Azure launches DDoS IP protection for SMBs
DDoS IP Protection for SMBs is designed to provide enterprise-grade distributed denial of service protection at a price that's attractive to small and medium-size companies.

Network World Security
Nov 21, 2022

Mastering Active Directory groups can streamline management, pave way for automation
On the surface, Active Directory groups are a simple and straightforward way to manage identities (users and/or computers) and assign permissions. Users or computers are added as group members, and the group is referenced in access control lists (ACL) on file shares, mailboxes, applications, or other corporate resources. But experienced admins know that this simplicity quickly goes out the window as environments scale. As group memberships grow, management of memberships becomes increasingly complex.

Over the years, Microsoft and others have developed best practices for managing groups and permissions in an Active Directory environment. These strategies are something of a lost art, but there's value to be gained by leveraging these layers of sophistication.

To read this article in full, please click here



Network World Security
Nov 21, 2022

Tame Active Directory groups to streamline management, prep for automation
On the surface, Active Directory groups are a simple and straightforward way to manage identities (users and/or computers) and assign permissions. Users or computers are added as group members, and the group is referenced in access control lists (ACL) on file shares, mailboxes, applications, or other corporate resources. But experienced admins know that this simplicity quickly goes out the window as environments scale. As group memberships grow, management of memberships becomes increasingly complex.

Over the years, Microsoft and others have developed best practices for managing groups and permissions in an Active Directory environment. These strategies are something of a lost art, but there's value to be gained by leveraging these layers of sophistication.

To read this article in full, please click here



Network World Security
Nov 18, 2022

Dell expands data-protection product line
Dell Technologies has announced new products and services for data protection as part of its security portfolio.

Active data protection is often treated as something of an afterthought, especially compared to disaster recovery. Yet it's certainly a problem for companies. According to Dell's recent Global Data Protection Index (GDPI) research, organizations are experiencing higher levels of disasters than in previous years, many of them man-made. In the past year, cyberattacks accounted for 48% of all disasters, up from 37% in 2021, and are the leading cause of data disruption.

One of the major stumbling blocks in deploying data-protection capabilities is the complexity of the rollout. Specialized expertise is often required, and products from multiple vendors are often involved. Even the hyperscalers are challenged to provide multicloud data-protection services.

To read this article in full, please click here



Network World Security
Nov 16, 2022

Palo Alto targets zero-day threats with new firewall software
Palo Alto Networks has released next-generation firewall (NGFW) software that includes some 50 new features aimed at helping enterprise organizations battle zero-day threats and advanced malware attacks.

The new features are built into the latest version of Palo Alto's firewall operating system - PAN 11.0 Nova - and include upgraded malware sandboxing for the company's WildFire malware-analysis service, advanced threat prevention (ATP), and a new cloud access security broker (CASB).

WildFire is Palo Alto's on-prem or cloud-based malware sandbox that is closely integrated with Palo Alto's firewalls. When a firewall detects anomalies, it sends data to WildFire for analysis. WildFire uses machine learning, static analysis, and other analytics to discover threats, malware and zero-day threats, according to the vendor.

To read this article in full, please click here



Network World Security
Nov 10, 2022

Should security systems be the network?
Recently during a research interview with a small but fast-growing business, for the first time I encountered an organization with a "no-network-vendor" network. That is, instead of using Cisco or Dell or even a white-box solution for switching and routing, the company deployed only Fortinet equipment for its entire network. That is, every network component is part of the security infrastructure for them.

They built the network this way not just to bake security into its core (a great idea in itself) but also for:

ease of management: they have one tool, it manages every component ease of deployment: they have only two or three versions of each appliance, all the same except for capacity and port count ease of expansion to new locations: every site is the same as any other site of similar size They have a small stock of replacement appliances on the shelf, with which they provide rapid recovery for all locations. They could easily also consume security-operations center as-a-service, and use professional services for nearly all the rest of their network operations. In essence, their security solution could become their complete network solution as well.

To read this article in full, please click here



Network World Security
Nov 09, 2022

Researchers show techniques for malware persistence on F5 and Citrix load balancers
Tests show that deploying malware in a persistent manner on load balancer firmware is within reach of less sophisticated attackers.

Network World Security
Nov 08, 2022

VMware adds more security for diverse cloud workloads
VMware has added more security features to its forthcoming on-demand multi-cloud networking and security service called Northstar that it previewed during its August VMware Explore 2022 conference.

VMware said then that Northstar will provide a central console for turning up networking and security services across private clouds and VMware Cloud deployments that run on public clouds. It will include VMware services such as Network Detection and Response, NSX Intelligence, advanced load balancing and Web Application Firewall. Within Northstar, Network Detection and Response support will provide scalable threat detection and response for workloads deployed in private and/or public clouds.

To read this article in full, please click here



Network World Security
Nov 04, 2022

Qualys previews TotalCloud FlexScan for multicloud security management
Agentless security management system aims to simplify vulnerability management for security teams and developers in cloud and hybrid cloud environments.

Network World Security
Nov 01, 2022

Cisco adds a firewall, upgrades security
Security is the name of the game at Cisco's Partner Summit gathering this week with the rollout of a new firewall and added data-loss prevention (DLP) and passwordless authentication features to its security wares. 

On the firewall front, Cisco announced the Secure Firewall 3105 it says is built specifically for hybrid workers and small branch offices. 

Available early next year, the 1U 3105 supports 10Gbps throughput, 7Gbps IPSec throughput and 3,000 VPN peers. The box is the new low-end for the Secure Firewall 3100 family, including the 3110, 3120, 3130 and the high-end 3140, which supports 45Gbps throughput.

To read this article in full, please click here



Network World Security
Oct 31, 2022

OCP spec for silicon security could help reduce vendor lock-in
A new specification from the Open Compute Project could mean more choices for IT pros when it comes time to replace server cards.

The spec defines a block of code that, when used in processors, establishes root of trust (RoT) boot security. Because the spec is open, any chip maker can use it, and it will provide interoperability with chips made by other chip makers that also use it. This can help eliminate being locked into a single vendor because of proprietary RoT code.

By standardizing on OCP hardware, for example, it's possible to replace a bad smartNIC from one vendor with one from another vendor, says Bill Chen, general manager of server product management at Supermicro, an OCP member.

To read this article in full, please click here



Network World Security
Oct 31, 2022

Engineering workstation attacks on industrial control systems double: Report
Some of the biggest challenges faced in securing industrial control systems involve integrating legacy and aging operational technology with modern IT systems.

Network World Security
Oct 27, 2022

How Cisco's Cloud Control Framework helps it comply with multiple security standards
Its open-source Cloud Control Framework gives Cisco a common template to meet security standards and regulatory requirements across the globe.

Network World Security
Oct 26, 2022

Cisco issues fixes for active exploits of its Windows VPN clients
Cisco is offering software updates for two of its AnyConnect for Windows products it says are actively being exploited in the field.

AnyConnect for Windows is security software package, in this case for Windows machines, that sets up VPN connectivity, provides access control and supports other endpoint security features. Cisco said AnyConnect products for MacOS, Linux are not affected.

Cisco said its Cisco Product Security Incident Response Team (PSIRT) is aware that proof-of-concept exploit code is available for the vulnerability, which is described in this advisory.

To read this article in full, please click here



Network World Security
Oct 21, 2022

IoT security strategy from enterprises using connected devices
Freeman Health System has around 8,000 connected medical devices in its 30 facilities in Missouri, Oklahoma, and Kansas. Many of these devices have the potential to turn deadly at any moment. "That's the doomsday scenario that everyone is afraid of," says Skip Rollins, the hospital chain's CIO and CISO.

Rollins would love to be able to scan the devices for vulnerabilities and install security software on them to ensure that they aren't being hacked. But he can't.

"The vendors in this space are very uncooperative," he says. "They all have proprietary operating systems and proprietary tools. We can't scan these devices. We can't put security software on these devices. We can't see anything they're doing. And the vendors intentionally deliver them that way."

To read this article in full, please click here



Network World Security
Oct 21, 2022

IoT security strategy from those who use connected devices
Freeman Health System has around 8,000 connected medical devices in its 30 facilities in Missouri, Oklahoma, and Kansas. Many of these devices have the potential to turn deadly at any moment. "That's the doomsday scenario that everyone is afraid of," says Skip Rollins, the hospital chain's CIO and CISO.

Rollins would love to be able to scan the devices for vulnerabilities and install security software on them to ensure that they aren't being hacked. But he can't.

"The vendors in this space are very uncooperative," he says. "They all have proprietary operating systems and proprietary tools. We can't scan these devices. We can't put security software on these devices. We can't see anything they're doing. And the vendors intentionally deliver them that way."

To read this article in full, please click here



Network World Security
Oct 21, 2022

Tips on securing IoT devices gleaned from enterprises that use them
Freeman Health System has around 8,000 connected medical devices in its 30 facilities in Missouri, Oklahoma, and Kansas. Many of these devices have the potential to turn deadly at any moment. "That's the doomsday scenario that everyone is afraid of," says Skip Rollins, the hospital chain's CIO and CISO.

Rollins would love to be able to scan the devices for vulnerabilities and install security software on them to ensure that they aren't being hacked. But he can't.

"The vendors in this space are very uncooperative," he says. "They all have proprietary operating systems and proprietary tools. We can't scan these devices. We can't put security software on these devices. We can't see anything they're doing. And the vendors intentionally deliver them that way."

To read this article in full, please click here



Network World Security
Oct 20, 2022

SolarWinds' Observability offers visibility into hybrid cloud infrastructure
SolarWinds, the maker of a well-known and widely used suite of IT management software products, announced this week that it's expanding to the cloud, with the release of Observability, a cloud-native, SaaS-based IT management service that is also available for hybrid cloud environments.

The basic idea of Observability is to provide a more holistic, integrated overview of an end-user company's IT systems, using a single-pane-of-glass interface to track data from network, infrastructure, application and database sources. The system's  machine learning techniques are designed to bolster security via anomaly detection.

To read this article in full, please click here



Network World Security
Oct 20, 2022

SolarWinds' Observability offers visibility into hybrid-cloud infrastructure
SolarWinds, is has launched a cloud-native, SaaS-based, IT-management service that is also available for hybrid-cloud environments.

Called Observability, the service provides a holistic, integrated overview of enterprise IT systems, using a single interface to track data from network, infrastructure, application, and database sources, says the company, which is noted for its suite of IT management software. The new service's machine-learning techniques are designed to bolster security via anomaly detection.

To read this article in full, please click here



Network World Security
Oct 18, 2022

Cisco launches 10-year plan to train 25 million people in IT skills
As Cisco celebrates the 25th anniversary of Cisco Networking Academy, the company on Tuesday announced two new certifications and a plan to provide networking, cybersecurity and general IT  training to 25 million people over the next 10 years.

The training will be done through the company's networking academy, an IT skills-to-jobs program that provides IT courses, learning simulators, and hands-on learning opportunities, supporting instructors and learners in 190 countries. To date, Cisco says more than 17.5 million global learners have taken Cisco Networking Academy courses to gain IT skills, with 95% of students attributing their post-course job or education opportunity to Cisco Networking Academy.

To read this article in full, please click here



Network World Security
Oct 12, 2022

Portnox adds IoT fingerprinting to network access control service
The IoT fingerprinting feature will allow companies to fully identify IoT devices that don't have the storage or processing capabilities to communicate complete identifying information such as model number, or even device type.

Network World Security
Oct 11, 2022

Google Cloud adds networking, security features for enterprises
Google Cloud is rolling out new network and security features, including a service that provides Layer-7 security.

The new offerings announced at Google Cloud Next also include firewall and web application-protection options aimed at advancing existing cloud connectivity and ensuring the security of cloud-based resources.

"We are fundamentally enhancing our network fabric—which includes 35 regions, 106 zones and 173 network edge locations across 200-plus countries—and making it simpler and easier for organizations to migrate their existing workloads and modernize applications all while securing and making them easier to manage," said Muninder Sambi, vice president and general manager of networking for Google Cloud.

To read this article in full, please click here



Network World Security
Oct 05, 2022

The astronomical costs of an asset disposal program gone wrong
As Morgan Stanley Smith Barney has learned, an information technology asset disposal program can protect a company against the potential catastrophe of data leaks from gear you're getting rid of.

Network World Security
Sep 29, 2022

About a third of cloud users need to learn resiliency lessons from Ian
Beyond the human cost, natural disasters like hurricane Ian can take a high toll on business continuity, causing enterprise-infrastructure damage that takes days or weeks to fix while downtime costs in the six figures per hour. If Ian didn't impact your operations, now is the time to prepare for a future disaster that might hit your network.

Vulnerable areas include cloud providers' managed services that might require customers to explicitly specify they want their apps, compute, and storage housed in redundant, geographically separate availability zones. According to Uptime Institute, roughly one third of enterprises are architecting cloud apps that are vulnerable to outages in single cloud availability zones, rather than distributing their workloads across multiple zones.

To read this article in full, please click here



Network World Security
Sep 29, 2022

About a third of you cloud users need to learn resiliency lessons from Ian
Beyond the human cost, natural disasters like hurricane Ian can take a high toll on business continuity, causing enterprise-infrastructure damage that takes days or weeks to fix at a downtime cost in the six figures per hour. If Ian didn't get you, now is the time to prepare for a future disaster that might hit your network.

Vulnerable areas include cloud providers' managed services that might require customers to explicitly specify they want their apps, compute, and storage housed in redundant, geographically separate availability zones. According to Uptime Institute, roughly one third of enterprises are architecting cloud apps that are vulnerable to outages in single cloud availability zones, rather than distributing their workloads across multiple zones.

To read this article in full, please click here



Network World Security
Sep 23, 2022

A third of Australian population likely affected in Optus cyberattack
Breached information includes names, dates of birth, phone numbers, email addresses, and, for a subset of customers, addresses, ID document numbers such as driver's licence or passport numbers.

Network World Security
Sep 13, 2022

Software-defined perimeter: What it is and how it works
A growing number of organizations are drawing an invisible line around their internet-connected resources in an effort to keep attackers at bay. Called software-defined perimeter (SDP), it is based on the relatively simple idea of throwing a virtual barrier around servers, routers, printers, and other enterprise network components.

The goal of SDP is to protect networks behind a flexible, software-based perimeter. "Advantages include stronger security and greater flexibility and consistency," says Ron Howell, principal SD-WAN and SASE architect at IT and business consulting firm Capgemini Americas.

To read this article in full, please click here



Network World Security
Sep 13, 2022

Cisco expands its SD-WAN software for wider reach, better security
Cisco has broadened the scope of Cisco SD-WAN software by growing its reach and security, and expanding its support for deploying multi-region WAN fabric.

The idea behind the new features is to help manage the complexity and security of connecting to cloud resources from the edge of the network, said JP Shukla, director, product management, in Cisco's Enterprise Cloud & SD-WAN group. "They want to connect these users as reliably and securely as these users would be in an office environment," he said.

[ Get regularly scheduled insights by signing up for Network World newsletters. ]

To read this article in full, please click here



Network World Security
Aug 31, 2022

Palo Alto Networks bulks-up its SASE portfolio
Palo Alto Networks is reinforcing the security and operational features of its Prisma secure-access service edge (SASE) package.

New features include the ability to adjust security settings for multiple software-as-a-service-based apps, new security capabilities, and AIOPs support. In addition the company is expanding its family of Ion SD-WAN security devices to provide additional configuration options.

[ Get regularly scheduled insights by signing up for Network World newsletters. ]

To read this article in full, please click here



Network World Security
Aug 18, 2022

How to set up DHCP failover on Windows Server
Redundancy is essential for dealing with both planned and unplanned outages, and that includes having redundant dynamic host-configuration protocol (DHCP) servers to allow uninterrupted dynamic assignment of IP addresses.

For those working in Windows environments, there are currently two options for setting up redundant DHCP servers: a failover scenario with a main server paired with another in hot standby; and a load-balancing scenario in which two DHCP servers actively handle client requests.

[ Get regularly scheduled insights by signing up for Network World newsletters. ]

To read this article in full, please click here



Network World Security
Aug 11, 2022

Cisco admits hack on IT network, links attacker to LAPSUS$ threat group
Cisco says an employee's credentials were compromised after an attacker gained control of a personal Google account.

Network World Security
Aug 08, 2022

What is IoT? The internet of things explained
The internet of things (IoT) is a catch-all term for the growing number of electronics that aren't traditional computing devices, but are connected to the internet to send data, receive instructions or both.

There's an incredibly broad range of ‘things' that fall under the IoT umbrella: Internet-connected ‘smart' versions of traditional appliances such as refrigerators and light bulbs; gadgets that could only exist in an internet-enabled world such as Alexa-style digital assistants; and internet-enabled sensors that are transforming factories, healthcare, transportation, distribution centers and farms.

What is the internet of things? The IoT brings internet connectivity, data processing and analytics to the world of physical objects. For consumers, this means interacting with the global information network without the intermediary of a keyboard and screen (Alexa, for example).

To read this article in full, please click here



Network World Security
Aug 04, 2022

Government-imposed internet shutdowns impacted 1.9 billion people in first half of 2022
Internet shutdowns by governments across the world impacted 1.89 billion citizens globally in the first half of 2022, a 22% increase when compared with the second half of 2021.

A recent report compiled by VPN service provider Surfshark found there were 66 state-mandated internet blackouts imposed across six countries and territories during the period: Burkina Faso, India, Jammu and Kashmir, Kazakhstan, Pakistan, and Sudan. Local shutdowns were observed in India, Jammu and Kashmir region, and Pakistan, while Burkina Faso, Kazakhstan, and Sudan chose to cut down internet connections nationwide.

While there was an overall decrease in the number of internet shutdowns during the period—72 cases in the first half of 2022 compared with 84 reported in the second half of 2021—the number of people impacted was much higher, as reliance on the internet has increased globally.

To read this article in full, please click here



Network World Security
Aug 02, 2022

Axis adds automation, onboarding features to Atmos ZTNA network access software
Axis is also offering migration tools and a buyback program for those looking to move from legacy ZTNA (zero trust network access) applications.

Network World Security
Jul 29, 2022

Network security depends on two foundations you probably don't have
You've done everything to secure your network, and you still face threats. That's what most enterprises say about their network security, and they're half right. Yes, they still face threats, but they've not done everything to address them. In fact, most enterprises haven't really implemented the two foundations on which real network security must be based.

When I ask enterprises whether they've done a top-down analysis of network security, they usually say they do it every year. When I ask what's involved in that assessment, they say they look for indications that their current strategies have failed. They build another layer, which is kind of like putting a second Band-Aid on a cut.

To read this article in full, please click here



Network World Security
Jul 27, 2022

IBM bolsters quantum cryptography for z16 mainframe
While the need for it may be years away, IBM has added additional mainframe protection against future quantum-based security attacks.

When Big Blue rolled out the newest iteration of its mainframe - the z16—in April, one of its core design pillars was a promise to protect organizations from anticipated quantum-based security threats. Specifically, the z16 supports the Crypto Express8S adapter to deliver quantum-safe APIs that will let enterprises start developing quantum-safe cryptography along with classical cryptography and to modernize existing applications and build new applications, IBM stated.

To read this article in full, please click here



Network World Security
Jul 15, 2022

Are you doing enough to secure your network infrastructure?
It's time to take a hard look at whether you're devoting enough resources to securing your network infrastructure. Short answer: You're probably not.

If you work for a hyperscaler, your organization is probably doing everything it can to secure the network. For almost everyone else, it is pretty safe to assume that the answer is no.

This is not necessarily a blameworthy failing. In many cases it is down to available resources and perceived risk: Given too little money for cybersecurity and too little time from too few people to tackle all possible risks in the network, what should network cybersecurity staff focus on? They tend to focus less on the inward-facing aspects of their networks and more on explicitly outward-facing pieces.

To read this article in full, please click here



Network World Security
Jul 15, 2022

4 ways to better secure your network infrastructure
It's time to take a hard look at whether you're devoting enough resources to securing your network infrastructure. Short answer: You're probably not.

If you work for a hyperscaler, your organization is probably doing everything it can to secure the network. For almost everyone else, it is pretty safe to assume that the answer is no.

This is not necessarily a blameworthy failing. In many cases it is down to available resources and perceived risk: Given too little money for cybersecurity and too little time from too few people to tackle all possible risks in the network, what should network cybersecurity staff focus on? They tend to focus less on the inward-facing aspects of their networks and more on explicitly outward-facing pieces.

To read this article in full, please click here



Network World Security
Jul 14, 2022

New speculative execution attack Retbleed impacts Intel and AMD CPUs
Unlike other speculative execution attacks like Spectre, Retbleed exploits return instructions rather than indirect jumps or calls.

Network World Security
Jul 13, 2022

Juniper upgrades management platform, adds a switch
Juniper Networks has upgraded its cloud-based management platform and introduced a new switch family for campus and branch networks.

On the management side, Juniper says the goal is to simplify network operations for organizations with a mix of campus, branch, micro-site, and remote-worker settings, and it is doing that by adding features to its Mist AI/ML cloud-based management platform and its Marvis virtual network assistant.

[ Get regularly scheduled insights by signing up for Network World newsletters. ]

To read this article in full, please click here



Network World Security
Jul 13, 2022

Consulting firms jump on the Zero Trust bandwagon
Deloitte's new Zero Trust Access service and HCL's collaboration with Palo Alto Networks mark a sustained trend towards offering Zero Trust security services for clients.

Network World Security
Jul 12, 2022

5 mistakes to avoid when implementing zero-trust
Interest in zero-trust security has heightened significantly over the past two years among organizations looking for better ways to control access to enterprise data in cloud and on-premises environments for remote workers, contractors and third parties.

Several factors are driving the trend, including increasingly sophisticated threats, accelerated cloud adoption and a broad shift to remote and hybrid work environments because of the pandemic. Many organizations have discovered that traditional security models where everything inside the perimeter is implicitly trusted, does not work in environments where perimeters don't exist and enterprise data and the people accessing it are increasingly distributed and decentralized.

To read this article in full, please click here



Network World Security
Jun 30, 2022

IBM brings hybrid-cloud app services to z/OS mainframes
IBM has introduced a service for its mainframe customers to create a cloud environment for developing and testing applications.

Wazi as a Service can be used to create z/OS infrastructure instances for development and testing z/OS application components in a virtualized, containerized sandbox. The instances would run on Red Hat OpenShift on x86 hardware. The service also includes access to z/OS systems and integrates with modern source-code management platforms such as GitHub and GitLab.

[ Get regularly scheduled insights by signing up for Network World newsletters. ]

To read this article in full, please click here



Network World Security
Jun 23, 2022

Cisco reports vulnerabilities in products including email and web manager
New vulnerabilities found in Cisco internal testing allow remote access and scripting that could lead to the loss of sensitive user data.

Network World Security
Jun 16, 2022

Cisco puts app-performance tools in the cloud
Cisco is taking aim at better controlling the performance and development of core applications with a new AppDynamics cloud service and open-source development tools.

AppDynamics Cloud is a cloud-native service designed to let enterprises observe applications and take action to remediate performance problems.  

[ Get regularly scheduled insights by signing up for Network World newsletters. ]

Available by the end of June, the service is built to observe distributed and dynamic cloud-native applications at scale, wrote chief marketing officer of Cisco AppDynamics, Eric Schou in a blog about the new offering.

To read this article in full, please click here



Network World Security
Jun 14, 2022

Cisco moves Catalyst, Nexus management to the cloud
Cisco is taking a big step toward cloud-management of both its Catalyst campus and Nexus data-center equipment.

At the Cisco Live customer event this week, the company rolled out two cloud-based management services that provide more options for enterprises to support hybrid workforces.

[ Get regularly scheduled insights by signing up for Network World newsletters. ]

Catalyst management in the cloud The first service, Cloud Management for Cisco Catalyst, lets customers manage and troubleshoot Catalyst 9000 switching and wireless campus and branch devices from the company's cloud-based Meraki dashboard, which can manage and troubleshoot a wide variety of devices and networks from a single screen. According to Cisco, Catalyst customers can run a CLI command with information about their organization, and it will move management of that device over to the Meraki cloud.

To read this article in full, please click here



Network World Security
Jun 08, 2022

RSA: Intel reference design to accelerate SASE, other security tasks
Intel has introduced a reference design it says can enable accelerator cards for security workloads including secure access service edge (SASE), IPsec, and SSL/TLS.

The upside of the server cards would be offloading some application processing from CPUs, effectively increasing server performance without requiring additional server rack space, according to Intel.

[ Get regularly scheduled insights by signing up for Network World newsletters. ]

The announcement was made at RSA Conference 2022, and details were published in a blog post by Bob Ghaffardi, Intel vice president and general manager of the Enterprise and Cloud Division.

To read this article in full, please click here



Network World Security
Jun 06, 2022

RSA: Cisco launches SASE, offers roadmap for other cloud-based services
Cisco made a variety of security upgrades at the RSA Conference designed to move security operation to the cloud, improve its Secure Access Service Edge offering and offer new simplified security end point control.

The biggest piece of the Cisco roll out was a new overarching security platform called the Cisco Security Cloud will include unified management and policies, and offer open APIs to help grow a multivendor security ecosystem. 

Cisco defines the  Security Cloud as a "multi-year strategic vision for the future of security." It is an ongoing journey that began several years ago and Cisco will continue delivering upon the key tenets of this vision with a consistent roadmap. The cloud will be made up of existing products like Umbrella and offerings from Duo, other features will be developed in the future.

To read this article in full, please click here



Network World Security
Jun 03, 2022

Who is selling Zero Trust Network Access (ZTNA) and what do you get?
Enterprise interest in Zero Trust Network Access (ZTNA) has soared over the past two years among organizations trying to enable secure anywhere, anytime, any device access to IT resources for employees, contractors and third parties.

Much of this interest has stemmed from organizations looking to replace VPNs as the primary remote access mechanism to their networks and data. But it is also being driven by organizations seeking to bolster security in an environment where enterprise data is scattered across on-premises and multi-cloud environments, and being accessed in more ways than ever before.

To read this article in full, please click here



  • CEOExpress
  • c/o CommunityScape | 200 Anderson Avenue
    Rochester, NY 14607
  • Contact
  • As an Amazon Associate
    CEOExpress earns from
    qualifying purchases.

©1999-2023 CEOExpress Company LLC