|
Sep 26, 2023
Security networking startup Tailscale has partnered with Mullvad to make Mullvad's global network of VPN services available to Tailscale customers looking to maintain user privacy while browsing the internet.
Tailscale provides software that creates a peer-to-peer mesh VPN, which allows for customers to create direct connections between devices. Tailscale enables encrypted point-to-point connections using the opensource WireGuard protocol, which means only devices on a private network can communicate with each other. WireGuard is an open-source project that is designed for quick reconnections, which improves reliability. WireGuard is also supported by consumer-grade VPN provider Mullvad.
To read this article in full, please click here
|
|
Sep 26, 2023
IBM is rolling out a new DNS-based service that will let customers securely control connectivity between distributed multicloud environments.
NS1 Connect is one of the first fruits from IBM's acquisition of DNS specialist NS1 earlier this year. The service is aimed at helping organizations set up the best connection between clouds and end users to deliver applications optimized for performance, cost, security and availability.
Core to the NS1 Connect package, which will be available Oct. 17, is traffic-steering technology that intelligently distributes DNS traffic across the network. DNS is often described as the Internet's phone book, working in the background to match the names of web sites that users type into a search box with the corresponding IP address.
To read this article in full, please click here
|
|
Sep 26, 2023
Attacks related to Domain Name System infrastructure - such as DNS hijacking, DNS tunneling and DNS amplification attacks - are on the rise, and many IT organizations are questioning the security of their DNS infrastructure.
Most IT organizations maintain a variety of DNS infrastructure for public services (websites and internet-accessible services) and private services (Active Directory, file sharing, email). Securing both internal and external DNS infrastructure is critical due to a growing number of threats and vulnerabilities that malicious actors use to target them. Unfortunately, very few organizations are confident in their DNS security.
Enterprise Management Associates (EMA) recently examined the issue of DNS security in its newly published research report, "DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-Cloud Era." Based on a survey of 333 IT professionals responsible for DNS, DHCP and IP address management (DDI), the research found that only 31% of DDI managers are fully confident in the security of their DNS infrastructure.
To read this article in full, please click here
|
|
Sep 21, 2023
Looking to significantly reinforce its security software portfolio, Cisco has struck a $28 billion cash deal to acquire enterprise and cloud protection company Splunk.
Founded in 2003, Splunk's software platform is known for its wide-reaching ability to search, monitor and analyze data from a variety of systems. Network security teams can use this information to gain better visibility into and gather insights about network traffic, firewalls, intrusion detection systems (IDSes), intrusion prevention systems (IPSes), and security information and event management (SIEM) systems, from on premise and or its cloud-based package, according to Splunk.
To read this article in full, please click here
|
|
Sep 21, 2023
For the last twelve years, 100% of CIOs have said that they expect to spend more on IT security, making security the only category that just keeps on absorbing investment. Every year in the last three years, over 80% of enterprises have said that their IT security still needed improvement. So, like death and taxes, is security spending growth inevitable? If we keep on the way we have, it sure seems like it. But what might change?
Let's start with what's important to users. External threats, meaning hacking, are a problem for every CIO. Internal threats, from badly behaving employees, are a problem for three out of four. Data theft is a universal fear, and malware that interferes with applications and operations is an important problem for over 90% of CIOs. As far as approaches or targets are concerned, 100% say access security on applications and data is essential and so is regular malware scanning. If you ask CIOs to pick a single thing they think is essential for IT security, it's access security.
To read this article in full, please click here
|
|
Sep 18, 2023
As the volume of IoT devices connecting to enterprise networks continues to climb, the number of security threats has been increasing in lockstep. Cybersecurity threats, alongside supply chain issues, chip shortages and geopolitical instability, are a major reason that IoT growth has been slower than many analysts had predicted.
Even so, the scale of the IoT security problem is great enough that 52 IoT startups raised a total of $840 million in the latest quarter, and even cautious analysts believe the IoT market will grow steadily in the coming years. In fact, research firm IDC predicts that the IoT market will expand to 55.7 billion connected IoT devices by 2025, with those devices generating 80B zettabytes (ZB) of data.
To read this article in full, please click here
|
|
Sep 15, 2023
As connectivity to cloud-based resources grows, cybercriminals are using valid, compromised credentials to access enterprise resources at an alarming rate.
That's one of the chief findings of the IBM X-Force Cloud Threat Landscape Report, which also found a 200% increase (about 3,900 vulnerabilities) in cloud-oriented Common Vulnerabilities and Exposures (CVE) in the last year.
"Over 35% of cloud security incidents occurred from attackers' use of valid, compromised credentials," wrote Chris Caridi, strategic cyber threat analyst with IBM X-Force, in a blog about the report. "Making up nearly 90% of assets for sale on dark web marketplaces, credentials' popularity among cybercriminals is apparent, averaging $10 per listing - or the equivalent of a dozen doughnuts."
To read this article in full, please click here
|
|
Sep 12, 2023
Cisco is adding a security module to its observability platform that promises to help enterprises assess threat risks and protect cloud-based resources.
The Cisco Secure Application module, available now, is part of the vendor's Full Stack Observability (FSO) platform, which is designed to correlate data from application, networking, infrastructure, security, and cloud domains to make it easier for customers to spot anomalies, preempt and address performance problems, and improve threat mitigation.
FSO is designed to make intelligent use of metrics, events, logs and traces. With it, organizations can consolidate to fewer tools, collect data from any source, correlate information, and enable AI-driven analysis to predict and prevent problems, Cisco said at the FSO launch event in June.
To read this article in full, please click here
|
|
Sep 06, 2023
In 2019, Gartner created the term secure access service edge (SASE) to describe a cloud-based service that combines networking and security in order to give remote workers safe access to internet-based resources.
Gartner had put its finger on a new set of challenges that enterprise IT faced as employees shifted to remote work during Covid and applications migrated to the cloud. But Gartner overshot the runway a bit; vendors were caught flatfooted and scrambled to cobble together full suites of SASE features.
On the customer side, a recent Gartner survey of CISOs revealed that "a majority of buyers are planning for a two-vendor strategy for SASE," with security and networking teams making separate buying decisions rather than opting for single-vendor SASE.
To read this article in full, please click here
|
|
Aug 30, 2023
VMware is advising customers to upgrade or patch its Aria for Network Operations software because of potential security problems.
VMware Aria is the vendor's multi-cloud management platform that integrates previously separate VMware services such as vRealize Automation, vRealize Operations, vRealize Network Insight, and CloudHealth. A single Aria Hub console provides centralized views and controls and lets customers see and manage the entire multi-cloud environment.
The vulnerabilities are in Aria Operations for Networks, a monitoring component that can find the cause of application delays based on TCP traffic latency and retransmissions and trigger alerts on the applications dashboard.
To read this article in full, please click here
|
|
Aug 29, 2023
Google Cloud has added a new service that promises to make it easier for enterprise customers to securely network multiple cloud-based resources.
The Cross-Cloud Network service consists of new and existing Google Cloud technology and includes a partner ecosystem to help organizations develop, build and support distributed enterprise applications across clouds.
"We know that 70-plus percent of our enterprises are going to adopt multicloud. [The] idea behind Cross-Cloud Network is that today many organizations operate bespoke networks with turnkey security to connect to those clouds that are operationally complex to manage and build, thereby resulting in a much higher total cost of ownership and soaring costs," said Muninder Sambi, vice president and general manager of networking for Google Cloud. "They set up private data centers to connect and secure the hybrid workforce to access cloud and on-prem resources and manage multiple CDN clouds to accelerate web apps. All of this can also lead to an inconsistent security posture and drives up total costs," Sambi said.
To read this article in full, please click here
|
|
Aug 29, 2023
Fortinet continues to enhance its Secure Access Service Edge (SASE) package by adding support for microbranches, extending wireless LAN protections, and improving data loss prevention (DLP) and end-user monitoring capabilities.
The vendor added the new features to its FortiSASE offering, which includes SD-WAN, secure web gateway, firewall as a service, cloud access security broker, and zero trust network access (ZTNA), all running on top of its FortiOS operating system. The package can be centrally managed via the firm's FortiManager software, which sets network and security policies across the Fortinet product line.
To read this article in full, please click here
|
|
Aug 28, 2023
The appeal of promising network technologies can be jaded by pressure to adopt untested ideas. When I look over the comments I've gotten from enterprise technologists this year, one thing that stands out is that almost three-quarters of them said that entrenched views held by company executives is a "significant problem" for them in sustaining their network and IT operations.
"Every story that comes out gets me a meeting in the board room to debunk a silly idea," one CIO said. I've seen that problem in my own career and so I sympathize, but is there anything that tech experts can do about it? How do you debunk the "big hype" of the moment?
For starters, don't be too dismissive. Technologists agree that a dismissive response to hype cited by senior management is always a bad idea. In fact, the opening comment that most technologists suggested is "I agree there's real potential there, but I think there are some near-term issues that need to be resolved before we could commit to it." The second-most-cited opening is "I've already launched a study of that, and I'll report back to you when it's complete." There's usually a grain (yeah, often a small grain) of truth underneath the hype pile, and the best approach is to acknowledge it somehow and play for time. Hype waves are like the tides; they come in and they go out, and many times management will move on.
To read this article in full, please click here
|
|
Aug 24, 2023
Cisco and Kyndryl have expanded their partnership to offer new services that are aimed at helping enterprise customers better detect and respond to cyber threats.
Specifically, Kyndryl will be integrating its own cyber resiliency offering with Cisco's overarching Security Cloud platform that includes security components such as Cisco's Duo access control, extended detection and response features, and Multicloud Defense, which orchestrates security and policy across private and public clouds.
Security Cloud operates as a layer on top of the infrastructure across a customer's cloud services - including Azure, AWS, GCP and private data-center clouds - to protect core applications, Cisco said. It features a unified dashboard, support for flexible trust policies, and open APIs to encourage third-party integrators. By correlating data and employing artificial intelligence and machine learning, Cisco Security Cloud can detect and remediate threats quickly throughout an organization, Cisco says.
To read this article in full, please click here
|
|
Aug 23, 2023
Versa is bolstering the AI security management features of its integrated Secure Access Service Edge (SASE) package to include improved malware detection for Advanced Threat Protection, network microsegmention and generative AI protection to help customers better detect and quickly mitigate threats to their networked service and applications.
The vendor supports AI in its integrated Versa SASE package that includes SD WAN, a next-generation and web application firewall, intrusion prevention, zero trust support and data loss prevention.
To read this article in full, please click here
|
|
Aug 15, 2023
As enterprise networks get more complex, so do the firewall deployments.
There are on-premises firewalls to manage, along with firewalls that are deployed in virtual machines and firewalls deployed in containers. There are firewalls for clouds and firewalls for data centers, firewalls for network perimeters, and firewalls for distributed offices. According to Gartner, by 2026, more than 60% of organizations will have more than one type of firewall deployment.
"A firewall used to be a box or a chasse with multiple cards," says Omdia analyst Fernando Montenegro. "Then we had a firewall in a virtual machine. And now we have a container form factor for a firewall because customers are deploying containers. And, oh, we need firewalls-as-a-service to support SASE."
To read this article in full, please click here
|
|
Aug 08, 2023
Aruba Networks is showing off some enhancements to its security platform - including new zero trust and sandboxing features - that promise to help customers advance fortification of their hybrid cloud and enterprise network environments.
Hewlett Packard Enterprise's network subsidiary is also detailing the progress it has made in integrating the security technology from its March purchase of Axis Security into Aruba's security service edge (SSE) platform with Aruba's SD-WAN and Secure Access Services Edge (SASE) offerings.
Some of the new features and directions will be demoed and discussed as part of Aruba's presence at this week's Black Hat 2023 event which will focus on everything security including AI, automation and threat intelligence issues.
To read this article in full, please click here
|
|
Aug 07, 2023
The last few years have seen an explosion of interest in Zero Trust Network Access (ZTNA). The zero trust approach replaces the perimeter defense model with a "least privilege" framework where users authenticate to access specific data and applications, and their activities are continuously monitored.
ZTNA gained a boost in the wake of the COVID-19 pandemic, with more employees working remotely. The old perimeter defense model, exemplified by VPNs, provides a secured internet connection that gives remote users privileges as if they were on an internal private network. This doesn't match up with a zero trust mindset; and to make things worse, many organizations found that their infrastructure couldn't handle the traffic loads created by large numbers of remote workers connecting via VPN.
To read this article in full, please click here
|
|
Aug 03, 2023
Fortinet has added new features to its SD-WAN software and a next-generation firewall series that promise to help customers better monitor and protect distributed enterprise resources.
On the SD-WAN front, Fortinet is introducing two services - a network underlay and overlay option to let customers better manage WAN traffic to remote sites.
The Underlay Performance Monitoring Service for SD-WAN utilizes the vendor's core central management system FortiManager and FortiGuard's database of hundreds of popular SaaS and cloud implementations, to offer visibility into the performance of the underlay network. The underlay network is typically made up if the physical network infrastructure supporting traffic between distributed cloud or remote office resources.
To read this article in full, please click here
|
|
Aug 01, 2023
Aiming to bolster its assessment of Internet traffic health, Cisco has acquired Code BGP, a privately held BGP monitoring startup, for an undisclosed amount.
Code BGP will slide into Cisco's ThousandEyes network intelligence product portfolio and bring a cloud-based platform that, among other features, maintains an inventory of IP address prefixes, peerings and outbound policies of an organization via configured sources, like BGP feeds. Border Gateway Protocol (BGP) tells Internet traffic what route to take, and the BGP best-path selection algorithm determines the optimal routes to use for traffic forwarding.
Then, the system lets customers see and interact with this inventory in real-time through an open API and bring real-time detection of BGP hijacking, route leaks, and other BGP issues according to the company. Adding such capabilities will let ThousandEyes further expand its BGP monitoring and incident analysis capabilities to maintain health of the Internet as well as key applications and services, according to Joe Vaccaro vice president of products for Cisco's ThousandEyes in a blog about the acquisition.
To read this article in full, please click here
|
|
Aug 01, 2023
Aiming to bolster its assessment of Internet traffic health Cisco said it would buy startup Border Gateway Protocol monitoring firm Code BGP for an undisclosed amount.
Privately held Code BGP will slide into Cisco's ThousandEyes network intelligence product portfolio and bring a cloud-based platform that among other features, maintains an inventory of IP address prefixes, peerings and outbound policies of an organization via configured sources, like BGP feeds. BGP tells Internet traffic what route to take, and the BGP best-path selection algorithm determines the optimal routes to use for traffic forwarding.
Then, the system lets customers see and interact with this inventory in real-time through an open API and bring real-time detection of BGP hijacking, route leaks, and other BGP issues according to the company. Adding such capabilities will let ThousandEyes further expand its BGP monitoring and incident analysis capabilities to maintain health of the Internet as well as key applications and services, according to Joe Vaccaro vice president of products for Cisco's ThousandEyes in a blog about the acquisition.
To read this article in full, please click here
|
|
Aug 01, 2023
Cisco has added ransomware detection and recovery support to its recently unveiled Extended Detection and Response (XDR) system.
The new features target recovery from ransomware attacks and come courtesy of integration with Cohesity's DataProtect and DataHawk offerings which offer configurable ransomware recovery and rescue support for systems assigned to a protection plan. Cohesity's platform can preserve potentially infected virtual machines for forensic investigation and protect enterprise workloads from future attacks.
Cisco said that the exponential growth of ransomware and cyber extortion has made a platform approach crucial to effectively counter adversaries. It also noted that during the second quarter of 2023, the Cisco Talos Incident Response team responded to the highest number of ransomware engagements in more than a year.
To read this article in full, please click here
|
|
Jul 25, 2023
A group of industry stalwarts is banding together to help enterprises, services providers and telcos fight cyber foes.
The Network Resilience Coalition includes AT&T, Broadcom, BT Group, Cisco Systems, Fortinet, Intel, Juniper Networks, Lumen Technologies, Palo Alto Networks, Verizon and VMware. Its aim is to deliver open and collaborative techniques to help improve the security of network hardware and software across the industry.
The coalition was brought together under the Center for Cybersecurity Policy & Law, a nonprofit organization dedicated to improving the security of networks, devices and critical infrastructure. The Center has a broad security mission, but at least for now, it wants the Resilience group to focus on routers, switches and firewalls that are older, may have reached end-of-life vendor support, or have been overlooked for security patching or replacement.
To read this article in full, please click here
|
|
Jul 18, 2023
Fortinet has released two new high-speed, next generation firewalls designed to protect data center assets.
The 387Gbps 3200F series and 164Gbps 900G series feature support for the vendor's AI-Powered Security Services, which blend AI and machine-learning technologies to make customers aware of cyber threats and act on protecting resources much more quickly, according to Nirav Shah, vice president of products and solutions at Fortinet.
FortiGuard AI-Powered Security Services use real-time data from Fortinet's threat researchers at FortiGuard Lab to monitor for new dangers. "We look at terabytes of data every day, and that's where we run our AI and machine learning to see different things - whether we need to enable AI-powered services with IPS, or utilize sandbox technologies to mitigate them," Shah said. "If you look at the cybersecurity industry, and the amount of data that we see, and the patterns and other things that we need to recognize to find the threats - [it] is extremely tough if you do it manually."
To read this article in full, please click here
|
|
Jul 17, 2023
Cisco announced a containerized firewall package for its venerable Catalyst switch family that's designed to help enterprise customers with mixed IT and OT systems more easily segment network resources and save money by consolidating network and security deployments.
Specifically, Cisco built a Docker-based container for its Secure Firewall Adaptive Security Appliance (ASA) that can be hosted on its Catalyst 9300 access switches. Cisco Secure Firewall ASA combines firewall, antivirus, intrusion prevention, encryption and virtual private network (VPN) support.
The firewall supports up to 10 logical interfaces, which can be used for segmentation. This segmentation helps limit the ability of an attacker to move laterally within the network by containing any breach to a specific zone, wrote Pal Lakatos-Toth, an engineering product manager with Cisco's security business group, in a blog about the news.
To read this article in full, please click here
|
|
Jul 14, 2023
Cisco is continuing its summer buying spree with the acquisition of security startup Oort for an undisclosed amount.
Oort offers an identity threat detection and response platform for enterprise security. Founded in 2019, Oort raised $15 million in Series A funding that included money from Cisco's venture capital arm.
"With Oort's API-driven, cloud-native, and agentless platform, they eliminate identity visibility gaps across disparate data sources, show misconfigurations, check for security vulnerabilities, and offer predictive identity analytics to proactively stop attacks," wrote Raj Chopra, senior vice president and chief product officer for Cisco Security, in a blog about the acquisition.
To read this article in full, please click here
|
|
Jul 13, 2023
Microsoft is jumping into the competitive Secure Service Edge (SSE) arena with a software package aimed at protecting its Windows and Azure customers as well as other cloud-based enterprise resources.
The new software is part of Microsoft's Entra identity and network access suite, and it features two new elements - Entra Internet Access and Entra Private Access - that will control and secure access to cloud-based resources. Those two new pieces, coupled with Microsoft's existing SaaS-focused cloud-access security broker (CASB), called Microsoft Defender for Cloud apps, comprise Microsoft's SSE package.
To read this article in full, please click here
|
|
Jul 12, 2023
Cisco unveiled a new version of its Secure Network Analytics (SNA) software aimed at making it easier to track more data flows and act faster on relevant security alerts. Enhancements in SNA release 7.4.2 include the ability to more efficiently gather, process and store data; advanced detection capabilities; improved telemetry support; and the ability to run on Cisco's high-performance UCS M6 hardware.
Cisco's network analytics software is designed to help organizations detect and respond to security threats by harnessing telemetry data from multiple sources and providing insights into network behavior to proactively identify risks, according to a blog post by Jay Bethea, product marketing manager with Cisco's secure email group.
To read this article in full, please click here
|
|
Jul 12, 2023
The market for managed security services is shifting as enterprises weigh their requirements for cloud-based security capabilities and vendors refine their feature sets and product integrations.
Converged security services can offer significant benefits to enterprises when it comes to manageability, scalability, security, and price, according to research firm Gartner, which introduced the term SASE, or secure access service edge. SASE is a network architecture that combines software-defined wide area networking (SD-WAN) and security functionality into a unified cloud service that promises simplified WAN deployments, improved efficiency and security, and application-specific bandwidth policies.
To read this article in full, please click here
|
|
Jul 11, 2023
Enterprises over the past several years have embraced SD-WAN for many reasons, including the flexibility of cloud architecture, enhanced security, centralized management of distributed locations, and improved application availability and performance. In turn, the popularity of SD-WAN has helped propel interest in secure access service edge (SASE), a network architecture that converges connectivity and security services.
To read this article in full, please click here
|
|
Jul 06, 2023
Network connectivity and security are key areas for IT investment as well as potential barriers to global success, according to new research.
Nearly half of CIOs claim that establishing and managing connectivity in new markets is the single most critical factor when it comes to ensuring successful global expansion, according to Expereo, which surveyed 650 large enterprise and mid-market CIOs across Asia, Europe and North America for its research. In addition, 49% of CIOs report that their board views global connectivity as "a business-critical asset to growth."
To read this article in full, please click here
|
|
Jun 30, 2023
To reduce the risk of service problems, Cisco is making it harder for organizations to use weak cryptographic algorithms when setting up authentication for OSPF packets on certain Catalyst Edge Platforms and Integrated Services Routers (ISR).
Newer versions of Cisco's IOS XE software (Release 17.11.1 and later) no longer support those algorithms—DES, 3DES, and MD5—by default, Cisco stated in a field Notice.
Specifically, the algorithms are no longer default options for the open shortest path first v 3 (OSPFv3) protocol, which uses the IPsec secure socket API to add authentication to OSPFv3 packets that distribute routing information.
To read this article in full, please click here
|
|
Jun 30, 2023
Virtualization technology provider VMware has announced that it is partnering with AMD, Samsung, and members of the RISC-V keystone community for the development and operations of confidential computing applications.
RISC-V is a hardware standards organization that is designing low-power processors; the Keystone Enclave is an open source project for building customizable trusted execution environments (TEEs).
The aim of the new partnership among VMware, AMD, Samsung and RISC-V participants is to collaborate to contribute to the open-source Certifier Framework project for confidential computing. The Certifier Framework is an open-source project started by VMware in 2022 to tackle the key barriers in the development of confidential computing applications.
To read this article in full, please click here
|
|
Jun 29, 2023
The software that runs Cisco's new Firewall 4200 Series now includes the ability to see into encrypted traffic without decrypting it, which the vendor says will allow enterprise customers to better protect hybrid and multicloud applications.
The enhanced Cisco Encrypted Visibility Engine (EVE) is part of the 7.4 version of the Secure Firewall operating system. Version 7.4 also includes zero-trust capabilities and improved application access control. The 4200 Series' operating system also helps improve overall firewall performance - it's twice as fast as previous high-end Cisco firewalls, the company says.
EVE, which has been available since version 7.2 of the software, takes things further than traditional firewalls because it now lets customers detect the client application within an encrypted tunnel, according to Rick Miles, vice president of product management, cloud and network security in Cisco's security business group.
To read this article in full, please click here
|
|
Jun 27, 2023
Cato Networks' new deep learning algorithms are designed to identify malware command and control domains and block them more quickly than traditional systems based on domain reputation, thanks to extensive training on the company's own data sets.
Cato, a SASE provider based in Tel Aviv, announced the new algorithmic security system today. The system is predicated on the idea that domain reputation tracking is insufficient to quickly identify the command servers used to remotely control malware. That's because most modern malware uses a domain generation algorithm (DGA) to rapidly generate pseudorandom domain names — which the deployed malware also has a copy of.
To read this article in full, please click here
|
|
Jun 26, 2023
The enterprise IT landscape is littered with supposedly paradigm-shifting technologies that failed to live up to the hype, and intil now, one could argue that AI fell into that category. But generative AI, which has taken the world by storm in the form of OpenAI's ChatGPT chatbot, just might be the real deal.
Chris Bedi, chief digital information officer at ServiceNow, says the release of ChatGPT last November was "an iPhone moment," an event that captured the public's attention in a way that "changed everything forever." He predicts that generative AI will become embedded into the fabric of every enterprise, and he recommends that CIOs and other IT leaders should begin now to develop their generative AI strategies.
To read this article in full, please click here
|
|
Jun 12, 2023
OK, it's not been a great first half for many companies, from end users to vendors and providers. The good news is that users sort of believe that many of the economic and political issues that have contributed to the problem have been at least held at bay.
There's still uncertainty in the tech world, but it's a bit less than before. Most of the companies I've talked with this year have stayed guardedly optimistic that things were going to improve. Over the last month, of the nearly 200 companies I've emailed with, only 21 were "pessimistic" about the outlook for their tech spending in the second half.
Lack of pessimism doesn't translate to optimism, though, and optimism is a bit non-specific for network and IT planners to build on. What are the user priorities for tech for the rest of the year? Do they think their budgets will shift, and if so from what to what? Are they looking to make major changes in their networks, change their vendors, be more or less open? I thought I knew some of the answers to these questions, but for some I was wrong.
To read this article in full, please click here
|
|
Jun 07, 2023
Looking to harness a decade of AI/ML development Cisco this week previewed generative AI-based features it will soon bring to its Security Cloud service and Webex collaboration offerings.
Cisco said it was looking meld the network and security intelligence it has amassed over the years with the large language models (LLMs) of generative AI to simplify enterprise operations and address threats with practical, effective techniques.
The first fruits of this effort will be directed at the Cisco Security Cloud, the overarching, integrated-security platform that includes software such as Duo access control and Umbrella security as well as firewalls and Talos threat intelligence access all delivered via the cloud.
To read this article in full, please click here
|
|
Jun 06, 2023
Cisco this week took the wraps off a security service edge (SSE) offering that aims to help enterprises securely connect growing edge resources, including cloud, private and SAAS applications.
Along with the SSE package, the vendor made two additional application security-related announcements at its Cisco Live! customer event. It unveiled Cisco Multicloud Defense, which is a new service designed to protect cloud service workloads, and it upgraded Panoptica, its cloud-native security application development software.
To read this article in full, please click here
|
|
Jun 06, 2023
Vehicle data and customer information were exposed for over eight years due to a cloud misconfiguration at Toyota Motor that impacted over 260,000 customers.
|
|
May 31, 2023
Cisco plans to buy Armorblox, a six-year-old AI vendor, to help create "an AI-first Security Cloud."
"Leveraging Armorblox's use of predictive and Generative AI across our portfolio, we will change the way our customers understand and interact with their security control points," wrote Raj Chopra senior vice president and chief product officer for Cisco Security in a blog announcing the pending acquistion.
While securing email was Armorblox's first application of its AI techniques, they might also be applied to attack prediction, rapid threat detection, and efficient policy enforcement, Chopra wrote. "Through this acquisition though, we see many exciting broad security use cases and possibilities to unlock."
To read this article in full, please click here
|
|
May 24, 2023
It's been 17 years and counting since Nemertes first wrote about the logic of integrating event response in the enterprise: bringing together the security operations center (SOC) and network operations center (NOC) at the organizational, operational, and technological levels. Needless to say, this has not happened at most organizations, although there has been a promising trend toward convergence in the monitoring and data management side of things. It's worth revisiting the issue.
Why converge?
The arguments for convergence remain pretty compelling:
Both the NOC and SOC are focused on keeping an eye on the systems and services comprising the IT environment; spotting and understanding anomalies; and spotting and responding to events and incidents that could affect or are affecting services to the business.
Both are focused on minimizing the effects of events and incidents on the business.
The streams of data they watch overlap hugely.
They often use the same systems (e.g. Splunk) in managing and exploring that data.
Both are focused on root-cause analysis based on those data streams.
Both adopt a tiered response approach, with first-line responders for "business as usual" operations and occurrences, and anywhere from one to three tiers of escalation to more senior engineers, architects, and analysts.
Most crucially: When something unusual happens in or to the environment (that router is acting funny), it can be very hard to know up front whether it is fundamentally a network issue (that router is acting funny - it has been misconfigured) or a security issue (that router is acting funny - it has been compromised) or both (that router is acting funny - it has been misconfigured and is now a serious vulnerability). Having fully separate NOC and SOC can mean duplicative work as both teams pick something up and examine it. It can mean ping-ponging inciden
|
|
May 24, 2023
It's been 17 years and counting since Nemertes first wrote about the logic of integrating event response in the enterprise: bringing together the security operations center (SOC) and network operations center (NOC) at the organizational, operational, and technological levels. Needless to say, this has not happened at most organizations, although there has been a promising trend toward convergence in the monitoring and data management side of things. It's worth revisiting the issue.
Why converge?
The arguments for convergence remain pretty compelling:
Both the NOC and SOC are focused on keeping an eye on the systems and services comprising the IT environment; spotting and understanding anomalies; and spotting and responding to events and incidents that could affect or are affecting services to the business.
Both are focused on minimizing the effects of events and incidents on the business.
The streams of data they watch overlap hugely.
They often use the same systems (e.g. Splunk) in managing and exploring that data.
Both are focused on root-cause analysis based on those data streams.
Both adopt a tiered response approach, with first-line responders for "business as usual" operations and occurrences, and anywhere from one to three tiers of escalation to more senior engineers, architects, and analysts.
Most crucially: When something unusual happens in or to the environment (that router is acting funny), it can be very hard to know up front whether it is fundamentally a network issue (that router is acting funny - it has been misconfigured) or a security issue (that router is acting funny - it has been compromised) or both (that router is acting funny - it has been misconfigured and is now a serious vulnerability). Having fully separate NOC and SOC can mean duplicative work as both teams pick something up and examine it. It can mean ping-ponging inciden
|
|
May 18, 2023
IBM is developing a SaaS package to help enterprises securely network heterogenous environments, including edge, on-prem and multicloud resources.
The IBM Hybrid Cloud Mesh is a SaaS service that implements a virtualized Layer 3-7 environment to rapidly enable secure connectivity between users, applications, and data distributed across multiple locations and environments, according to Andrew Coward, general manager of IBM's software defined networking group.
In a nutshell, Hybrid Cloud Mesh deploys gateways within the clouds - including on-premises, AWS or other providers' clouds, and transit points, if needed - to support the infrastructure, and then it builds a secure Layer 3-7 mesh overlay to deliver applications, Coward said. At the application level, the exposure to developers occurs at Layer 7, and the networking teams see Layer 3 and 4 activities, Coward said.
To read this article in full, please click here
|
|
May 15, 2023
Cisco is more tightly integrating its network- and application-intelligence tools in an effort to help customers quickly diagnose and remediate performance problems.
An upgrade to Cisco's Digital Experience Monitoring (DEM) platform melds the vendor's AppDynamics application observability capabilities and ThousandEyes network intelligence with a bi-directional, OpenTelemetry-based integration package. (Read more about how to shop for network observability tools)
The goal with DEM is to get business, infrastructure, networking, security operations, and DevSecOps teams working together more effectively to find the root cause of a problem and quickly address the issue, said Carlos Pereira, Cisco Fellow and chief architect in its Strategy, Incubation & Applications group.
To read this article in full, please click here
|
|
May 09, 2023
Ransomware protection for on-premises systems and hyperconverged infrastructure is the goal of the latest release from "smart infrastructure" vendor Nebulon.
|
|
May 03, 2023
Cisco today announced a new finance program that encourages customers to buy products and services now without having to start paying for them till 2024.
Specifically the Cisco Capital Business Acceleration Program will let customers purchasing Cisco products before July 29, 2023, and defer all payments until 2024. Payments deferred until 2024 would be based on the total amount financed and contract terms, the vendor stated.
Cisco said another flexible payment option is available for its partners to let their customers buy Cisco technology today, and pay later, the vendor said in a statement.
The entirety of Cisco's portfolio is eligible for the program, including hardware, software, and services, as well as select partner services and third-party hardware. In addition the Cisco Refresh portfolio of Cisco certified remanufactured products is also eligible for organizations that want to acquire used gear, the vendor stated.
To read this article in full, please click here
|
|
May 03, 2023
Amazon Web Services has launched a service that secures user access to its cloud applications without requiring a VPN.
AWS Verified Access, which the company previewed last November, validates every application request using Zero Trust principles before granting access to applications. Since AWS previewed the networking service, it has added two new features: AWS Web Application Firewall (WAF) and the ability to pass signed identity context to customers' application endpoints.
To read this article in full, please click here
|
|
Apr 28, 2023
Security, AI, and network-as-a-service (NaaS) were top of mind for Aruba Networks execs at their Atmosphere customer conference this week.
"Ten years ago for most network operators their main job was making sure connectivity was reliable and security was someone else's problem. It was outside their perimeter," said David Hughes, senior vice president, chief product and technology officer with Aruba. "But today all perimeters have dissolved and the network has expanded," .
"The networking team is now responsible for making sure connectivity is secure from the start. Bolting it on somewhere won't cut it anymore, it needs to be built into the network," Hughes said.
To read this article in full, please click here
|
|
Apr 26, 2023
Here's bad news: It's easy to buy used enterprise routers that haven't been decommissioned properly and that still contain data about the organizations they were once connected to, including IPsec credentials, application lists, and cryptographic keys.
"This leaves critical and sensitive configuration data from the original owner or operator
To read this article in full, please click here
|
|
Apr 26, 2023
Akamai's Prolexic network cloud firewall now offers the ability to customize access control lists and deploy them at network edges.
|
|
Apr 24, 2023
Arista Networks has rolled out a SaaS-based service aimed at helping enterprises more network access control (NAC) more easily.
The service, called CloudVision Guardian for Network Identity (CV-AGNI) uses real-time telemetry from Arista's network products, combines it with data from its CloudVision management platform, and uses artificial intelligence to evaluate the information and implement security policies.
The service can also onboard new devices, authenticate existing users, segment devices on the network, or help troubleshoot problems from a cloud-based system, according to Pramod Badjate, group vice president and general manager, of Arista's Cognitive Campus group.
To read this article in full, please click here
|
|
Apr 24, 2023
Cisco is taking its first major step into Extended Detection and Response (XDR) with a SaaS-delivered integrated system of endpoint, network, firewall, email and identity software aimed at protecting enterprise resources.
Cisco's XDR service, which will be available July, brings together myriad Cisco and third-party security products to control network access, analyze incidents, remediate threats, and automate response all from a single cloud-based interface. The offering gathers six telemetry sources that Security Operations Center (SOC) operators say are critical for an XDR solution: endpoint, network, firewall, email, identity, and DNS, Cisco stated.
To read this article in full, please click here
|
|
Apr 21, 2023
Left unmitigated, the vulnerabilities could lead to unauthorized remote access, denial of service attacks, or privilege escalation.
|
|
Apr 18, 2023
Cisco's Talos security intelligence group issued a warning today about an uptick in highly sophisticated attacks on network infrastructure including routers and firewalls.
The Cisco warning piggybacks a similar joint warning issued today from The UK National Cyber Security Centre (NCSC), the US National Security Agency (NSA), US Cybersecurity and Infrastructure Security Agency (CISA) and US Federal Bureau of Investigation (FBI) that noted an uptick in threats in part utilizing an exploit that first came to light in 2017. That exploit targeted an SNMP vulnerability in Cisco routers that the vendor patched in 2017.
To read this article in full, please click here
|
|
Apr 13, 2023
The upcoming cloud system will provide an added layer of network and data handling security for companies working on national security and defense projects and collaborating through the Webex app.
|
|
Apr 11, 2023
Data backup and management company Cohesity today announced plans to offer an Azure OpenAI-backed chatbot as both a security analysis tool and line-of-business assistant, along with tighter integration with Active Directory, Sentinel and Purview, as part of an expanded partnership with Microsoft.
To read this article in full, please click here
|
|
Apr 11, 2023
The transition from software-defined WAN (SD-WAN) to secure access service edge (SASE) is proving to be difficult for many enterprises, according to new research from Enterprise Management Associates (EMA).
If you're a network or security professional, you're probably familiar with SASE, a new class of solutions that integrates SD-WAN, secure remote access, and cloud-delivered, multi-function network security. Many enterprises are now evolving their SD-WAN implementations into a SASE solution, either by adopting their SD-WAN providers' SASE capabilities or integrating their SD-WAN with third-party, cloud-based network security solutions.
To read this article in full, please click here
|
|
Apr 04, 2023
Tighter integration between Fortinet's SASE and SD-WAN offerings is among the new features enabled by the latest version of the company's core operating system.
FortiOS version 7.4 also includes better automation across its Security Fabric environment, and improved management features.
FortiOS is the operating system for the FortiGate family hardware and virtual components, and it implements Fortinet Security Fabric and includes firewalling, access control, Zero Trust, and authentication in addition to managing SD-WAN, switching, and wireless services.
To read this article in full, please click here
|
|
Mar 30, 2023
Kyndryl, the managed IT services provider that spun out of IBM, has announced layoffs that could affect its own internal IT services.
"We are eliminating some roles globally — a small percentage — to become more efficient and competitive," said a Kyndryl spokesperson, without giving the exact number of employees affected due to the layoffs.
"These actions will enable us to focus our investments in areas that directly benefit our customers and position Kyndryl for profitable growth," the spokesperson said, adding that the company was in the process of undergoing transformation to streamline and simplify its processes and systems.
Bloomberg first reported about the layoffs.
To read this article in full, please click here
|
|
Mar 14, 2023
Akamai report highlights how widespread malware threats remain, noting the dangers of threats specific to DNS infrastructure.
|
|
Mar 10, 2023
The company's marketing vendor suffered a security failure in January and exposed CPNI data that included first names, wireless account numbers, wireless phone numbers, and email addresses.
|
|
Mar 10, 2023
The technique used in the attack on SonicWall devices are consistent with earlier attacks from a Chinese campaign.
|
|
Mar 09, 2023
Aruba Networks plans to prioritize development of a short list of key networking technologies - including data-center switching, private 5G, and secure access service edge (SASE) - that it finds are top of mind for enterprise customers.
Hewlett Packard Enterprise's network subsidiary is fresh off a successful first quarter that saw revenue climb 31% year over year. Aruba general manager Phil Mottram attributes the record revenue in large part to the company's Intelligent Edge strategy, which includes technologies to help customers adopt and manage network and application resources.
To read this article in full, please click here
|
|
Mar 07, 2023
VMware has revamped its Workspace One mobile and virtual desktop platform by boosting performance, making it more service-oriented and easy to manage.
Workspace One is VMware's endpoint-management package for delivering, managing and securing application access to any device across the a cloud or distributed on-premises enterprise. The highly-integrated suite includes device management, single sign-on, remote access control, endpoint security, analytics, automation and virtualization.
The company workers usin and accessing applications from multiple devices prompted the over-arching need to change Workspace One and how its services are delivered.
To read this article in full, please click here
|
|
Mar 07, 2023
UNDER EMBARGO UNTIL TUESDAY, MARCH 7 AT 9AM ET
Fortinet has added features that broaden the range of management and security tools for its secure access service edge (SASE) package.
The company has added a feature to its Secure Private Access that ties SASE resources together with SD-WAN-based applications through a Fortinet SD-WAN hub located in a nearby point-of-presence (PoP). The idea is to support larger hybrid environments and simplify anywhere access to corporate applications, said Nirav Shah, vice president of products with Fortinet.
To read this article in full, please click here
|
|
Mar 07, 2023
Akamai Hunt combines the company's historic DNS, WAF, and DDoS data with Guardicore's segmentation and telemetry to detect and eliminate evasive threats.
|
|
Mar 07, 2023
As the security model becomes the preferred security strategy, it's worth looking at what it is and what it takes to achieve.
|
|
Mar 06, 2023
The name Royal Caribbean conjures up images of luxury cruise ships, top-notch entertainment, fine dining, sandy beaches, breathtaking sunsets, tall tropical beverages.
"Our mission is to create fabulous vacations with great experiences and great memories for our crew and our guests," says John Maya, vice president of operational excellence at Miami-based Royal Caribbean Group.
Beyond the glitz and glamour, however, Royal Caribbean has the same internal systems as any company in the travel/hospitality industry - corporate offices, sales, marketing, reservations, call centers, baggage handling, etc.
Maya describes his IT infrastructure as hybrid cloud, with some resources hosted on Amazon AWS and Microsoft Azure, but also some core systems, such as the mission critical reservations application, running on an IBM AS-400 server in an Equinix data center in Virginia.
To read this article in full, please click here
|
|
Mar 03, 2023
HPE plans to expand its Aruba SASE platform with Axis Security's Atmos, delivering a comprehensive edge-to-cloud, network and security solution as a service.
|
|
Mar 02, 2023
IBM and data security and backup provider Cohesity have formed a new partnership, calling for Cohesity's data protection functionality to be incorporated into an upcoming IBM storage product suite, dubbed Storage Defender, for better protection of end-user organizations' critical information.
The capabilities of Cohesity's DataProtect backup and recovery product will be one of four main feature sets in the Storage Defender program, according to an announcement from IBM Thursday.
The Storage Defender suite is designed to bring together IBM and third-party products in order to unify primary, secondary replication, and backup management, said IBM. It's an as-a-service offering that features a single-pane-of-glass interface, SLA-driven policy automation and the ability to work with a wide variety of data sources, including physical storage, cloud hypervisors, and an assortment of different database types.
To read this article in full, please click here
|
|
Mar 02, 2023
The top five exploited vulnerabilities in 2022 include several high-severity flaws in Microsoft Exchange, Zoho ManageEngine products, and virtual private network solutions from Fortinet, Citrix and Pulse Secure.
|
|
Mar 01, 2023
IBM said this week it will soon roll out an AI-infused, hybrid-cloud oriented version of its z/OS mainframe operating system.
Expected in the third quarter, z/OS 3.1 will support technologies intended to enable deployment of AI workloads co-located with z/OS applications, IBM said in a customer preview letter.
The new OS will work best with the newest version of the Big Iron, the z16, but it will support z14 models and above, IBM says.
The z16 includes an AI accelerator built onto its core Telum processor that can do 300 billion deep-learning inferences per day with one millisecond latency and includes what IBM calls a quantum-safe system to protect organizations from anticipated quantum-based security threats.
To read this article in full, please click here
|
|
Feb 27, 2023
One year after Russia's invasion of Ukraine, the country's overall resilience and defiance has been inspiring, but telecommunications and internet connectivity has grown much more difficult.
Initially the country's internet network mostly withstood with some outages and slowdowns, but that has changed over time as the aggressors devote more effort in destroying physical locations and deploying malware and other cybersecurity weapons.
For example, researchers at Top10VPN recently reported some distressing analysis including:
To read this article in full, please click here
|
|
Feb 24, 2023
The CDN provider's new DDoS scrubbing offering impersonates the customer's network to phase out malicious traffic, and employs advanced IP masking at source to prevent direct-to-origin attacks.
|
|
Feb 22, 2023
A malicious campaign against data centers stole the access credentials of some of the world's biggest companies — including Amazon, Apple, Goldman Sachs, and Microsoft — according to reports.
|
|
Feb 17, 2023
The new V3G4 variant of Mirai, which creates botnets for DDoS attacks, exploited 13 different vulnerabilities in three campaigns over a six-month period, Palo Alto Network's Unit 42 team reports.
|
|
Feb 13, 2023
Observability may be the latest buzzword in an industry loaded with them, but Cisco will tell you the primary goal of the technology is to help enterprises get a handle on effectively managing distributed resources in ways that have not been possible in the past.
The idea of employing observability tools and applications is a hot idea. Gartner says that by 2024, 30% of enterprises implementing distributed system architectures will have adopted observability techniques to improve digital-business service performance, up from less than 10% in 2020.
"Today's operational teams have tools for network monitoring, application monitoring, infrastructure monitoring, call monitoring, and more, but they rarely intermingle to provide a cohesive view of what's going on across the enterprise," according to Carlos Pereira, Cisco Fellow and chief architect in its Strategy, Incubation & Applications group.
To read this article in full, please click here
|
|
Feb 13, 2023
Nigel Williams-Lucas, director of Information Technology at Maryland-based footwear retailer DTLR, faced a challenge that most IT execs will recognize: the business was pushing hard on digital transformation, and the IT infrastructure was struggling to keep pace.
Store managers were seeking better data analytics and business intelligence from backend systems like inventory and sales. The business wanted IT systems to support customers ordering online and picking up at a physical store within two hours.
The network needed to securely support real-time, bandwidth-intensive IP security cameras. And Williams-Lucas wanted to roll out beaconing technology, in which the network gathers information about customer in-store activity via Bluetooth or Wi-Fi, and can send discount offers to a customer's phone based on where they are in the store and what they appear to be interested in.
To read this article in full, please click here
|
|
Feb 09, 2023
After the FBI and CISA on Wednesday released a recovery script for organizations affected by a massive ransomware attack targeting VMWare ESXi servers worldwide, reports surfaced that the malware evolved in a way that made earlier recovery procedures ineffective.
The attacks, aimed at VMware's ESXi bare metal hypervisor, were first made public February 3 by the French Computer Emergency Response Team (CERT-FR), and target ESXi instances running older versions of the software, or those that have not been patched to current standards. Some 3,800 servers have been affected globally, CISA and the FBI said.
To read this article in full, please click here
|
|
Feb 08, 2023
Extreme Networks has added network fabric capabilities to its flagship SD-WAN platform to enable customers to link and manage distributed resources more securely.
Additional enhancements to the ExtremeCloud SD-WAN platform include improved automated workflows and direct connectivity to cloud systems such as Microsoft Azure and AWS.
"The overarching idea is to help customers more effectively connect distributed sites, especially the smaller branch office, without increasing optical or management overhead," said Rob Hull, product marketing director at Extreme. "For the smaller sites, especially, with maybe no IT person or few, it gives them the big-site quality-of-service feel and big-site centralized management capability."
To read this article in full, please click here
|
|
Feb 07, 2023
Cisco has strengthened some of its key security software packages with an eye toward better protecting distributed enterprise resources.
Specifically, Cisco added more intelligence to its Duo access-protection software and introduced a new application called Business Risk Observability that can help enterprises measure the impact of security risks on their core applications. The company also enhanced its SASE offering by expanding its SD-WAN integration options.
To read this article in full, please click here
|
|
Feb 07, 2023
The semiconductor equipment maker reported the ransomware incident just a day after national cybersecurity agencies and security experts around the world warned about a global ransomware attack that hit thousands of servers running on VMware ESxi.
|
|
Feb 06, 2023
Cybersecurity agencies globally, including in Italy, France, the US and Singapore have issued alerts about a ransomware attack targeting the VMware ESXi hypervisor.Aourva
|
|
Feb 06, 2023
Fortinet is introducing a new ASIC that promises to meld the security and network functions of its core family of FortiGate firewalls more efficiently and powerfully.
The custom chip is 7-nanometer package, called fifth-generation security processing system or FortiSP5, that promises a number of performance improvements for the FortiGate system. It enables 17x faster firewall performance and 32x faster encryption processes while using 88% less power compared to standard CPUs, according to John Maddison, executive vice president of products and CMO at Fortinet. With FortiSP5, Fortinet's firewalls will be able to handle higher levels of traffic inspection to block threats and boost protection, according to the vendor.
To read this article in full, please click here
|
|
Feb 06, 2023
A new, tablet-sized media scanner boasts a wide range of capabilities for critical infrastructure defense.
|
|
Feb 02, 2023
A new offering from IT services provider NTT combines Palo Alto Networks' Prisma SASE offering with NTT's managed network services and AIOps infrastructure.
SASE - secure access service edge - has been gaining interest for its potential to reduce networking complexity while improving security. It combines SD-WAN with security services, including secure web access gateway (SWG), cloud access security broker (CASB), zero-trust network access (ZTNA), and firewall-as-a-service (FWaaS), in a single, cloud-delivered service model.
To read this article in full, please click here
|
|
Feb 02, 2023
Before the start of the Covid epidemic, a traditional WAN architecture with centralized security worked well for Village Roadshow. "Advanced security inspection services can be applied, firewalls can provide separation, and a demilitarized zone can be implemented," said Michael Fagan, chief transformation officer at Village Roadshow, the largest theme park owner in Australia.
But it required backhauling traffic from remote sites to a data center or hub for security inspection, which can hurt application performance, create a poor user experience, and cost the company in productivity, he said.
When the pandemic led the company to transition to a hybrid workforce, with most people working from home or from a remote site, it prompted Village Roadshow to rethink its network and security approach.
To read this article in full, please click here
|
|
Feb 01, 2023
About 87% of container images include a high or critical vulnerability, while 90% of granted permissions are not used, according to cybersecurity firm Sysdig.
|
|
Jan 23, 2023
A new AI-based system from Nvidia sniffs out unusual behavior and ties it to users, in an effort to prevent insider attacks and protect digital credentials.
|
|
Jan 20, 2023
AmerCareRoyal, which provides disposable products for the food service and hospitality industries, is the product of six mergers and acquisitions over the past several years, and its former network security setup couldn't keep up.
Jeff DeSandre, who joined the company as CIO in 2019, wanted an SD-WAN platform that came with more advanced management options and firewalls. After looking at the market, he added threat detection and response capabilities to his wish list. "I was focused on getting our arms quickly around our wide area network and securing our edge, and then making sure that the solution I went with could scale to my long-term roadmap," he says.
To read this article in full, please click here
|
|
Jan 19, 2023
By 2024, 88% of enterprises will use two or more infrastructure as a service (IaaS) providers, according to research by EMA, which believes that network infrastructure and operations teams must take a leadership role in defining network architecture that ensures the performance and security of their multi-cloud digital services.
EMA recently polled a group of these enterprises, surveying 351 IT stakeholders, including 39% in network engineering, 21% in the CIO suite, 15% on cloud teams, and 11% in cybersecurity.
EMA found that networking teams and network technology have become more important in 81% of multi-cloud strategies in recent years. Unfortunately, only 24% of research participants firmly believe that their networking teams have enough influence over cloud decision-making.
To read this article in full, please click here
|
|
Jan 18, 2023
Quantum-based security with what's advertised as "frictionless" deployment is now available from QuSecure.
|
|
Jan 17, 2023
New integration with Okta, containerization support and a tagging system are all present in the latest version of Remote.it's network management platform.
|
|
Jan 13, 2023
Secure access service edge (SASE) is a network architecture that rolls SD-WAN and security into a single, centrally-managed cloud service that promises simplified WAN deployment, improved security, and better performance.
According to Gartner, SASE's benefits are transformational because it can speed deployment time for new users, locations, applications, and devices, as well as reduce attack surfaces and shorten remediation times by as much as 95%.
With the pandemic, adoption of SASE has been on an upward swing. Gartner predicts in its most recent SASE roadmap that 80% of enterprises will have adopted a SASE or SSE architecture by 2025, up from 20% in 2021. (Security service edge, or SSE, is a security-focused subset of SASE that's basically SASE without SD-WAN.)
To read this article in full, please click here
|
|
Jan 12, 2023
Despite the challenges posed by economic turmoil, epidemics, and political upheaval, network researchers are continuing to blaze new trails in innovation, performance, management, and security. In sum, 2023 is shaping up as a year of network evolution and transformation.
Here are eight network technologies you will want to pay particularly close attention to.
1. Unified SASE: Addresses hybrid workforce, hybrid clouds
Unified Secure Access Service Edge (SASE) tightly integrates security and networking into a single platform. The technology uses a single-pass scanning architecture combined with a unified policy that's configured via a unified console that draws from a unified data lake. "This is significant for organizations to continue to provide a consistent and assured user experience while protecting users, devices, sites, and data amid the rapidly evolving dynamics coming in 2023," says Kelly Ahuja, CEO of networking and cybersecurity firm Versa Networks.
To read this article in full, please click here
|
|
Jan 10, 2023
Intel's TDX framework gains a new capability, and a "shadow stack" in Xeon's fourth generation aims to knock out a dangerous cyberattack method.
|
|
Jan 09, 2023
The pandemic has changed how we work, probably forever. Most employees with jobs that can be done effectively from home have no intention of returning full time to the office. They find that their work-life balance is much more balanced without the long commutes and constant interruptions that accompany office work.
According to a McKinsey/Ipsos survey, 58 percent of American workers had the opportunity to work from home at least one day a week in 2022, while 38 percent were not generally required to be in the office at all.
To read this article in full, please click here
|
|
Jan 06, 2023
Industry veteran Tom Gillis, who left VMware in December, has returned to Cisco in a new but familiar role: senior vice president and general manager of Cisco's Security Business Group.
From 2007 to 2011, Gillis was vice president and general manager of Cisco's then-called Security Technology Group, which focused on developing network, content and identity management products.
After that, Gillis founded cloud computing firm Bracket Computing, which was acquired by VMware in May 2018.
Gillis ran VMware's $2 billion networking and security business from that point until this past December, and he was responsible for a number of its core products, including VMware's NSX networking and network/edge software products.
To read this article in full, please click here
|
|
Dec 26, 2022
What's the single most important thing that enterprises should know about networking in 2023? Forget all that speeds-and-feeds crap you hear from vendors. The answer is that networking is now, and forever, linked to business applications, and those applications are linked now to the way that we use the Internet and the cloud. We're changing how we distribute and deliver business value via networking, and so network technology will inevitably change too, and this is a good time to look at what to expect.
Growth in Internet dependence
First, the Internet is going to get a lot better because it's going to get a lot more important. It's not just that the top-end capacities offered will be raised, in many cases above 2 Gbps. Every day, literally, people do more online, and get more interactive, dynamic, interesting, websites to visit and content to consume. Internet availability has been quietly increasing, and in 2023 there will be a significant forward leap there, in large part because people who rely on something get really upset when it's not working.
To read this article in full, please click here
|
|