Network Access Control: User and Device Authentication
By: Intel Corporation View more from Intel Corporation >>
Download this next:
Focus: Network security
By: TechTarget ComputerWeekly.com
Type: eGuide
During the course of 2016 we saw the clamour around network security – which was already very loud – reach fever pitch. From allegations of nation state-level interference in crucial elections, to massive botnet attacks that brought down critical online services for millions, network security dominated mainstream news cycles for weeks on end.
All of this adds up to a real problem for hard-worked network managers, who are coming under more and more pressure to maintain the everyday running of the enterprise network while protecting it from multiple different threats to its well-being. One mistake could bring an entire business down for days, and in some cases, this can prove fatal.
In this guide we will explore some of the key themes driving enterprise network security initiatives, from how to protect and monitor day-to-day activity on the network, to tips on how to defend it from malicious external attackers, and the effect that emerging networking technologies, such as the Internet of Things (IoT) and software-defined networking (SDN) will have on enterprise network security, and how to adapt to face these changing realities.
These are also closely related to: "Network Access Control: User and Device Authentication"
-
Network security in the post-pandemic era
By: TechTarget ComputerWeekly.com
Type: eGuide
With networks coming under strain due to the growth in remote work, cloud adoption and other digital transformation efforts, organisations have been struggling to get a handle on network security.
This comes at a time when cyber attackers have been on the prowl, knocking on the doors of networks that are insecure in order to gain access to critical systems.
Such challenges have prompted organisations to revamp their network security architecture, leveraging concepts like zero trust to keep threat actors at bay.
In this e-guide, read more about the convergence of network management and security, and how network security will be impacted in the hybrid workplace, among other trends. -
Best practices for addressing voice network vulnerabilities
By: Ribbon Communications
Type: White Paper
As communications technology has advanced and unintentionally carried subsequent security issues, it has become clear that firewalls alone are not enough to provide a secure network.
Instead, enterprises need a complete, seamless approach to network security to prevent exploitation through their VoIP communications.
Access this white paper to learn about the current state of communications and voice network security, as well as:
- Threats that SIP/IP communications face
- Potential barriers to network security
- How to build your defenses
- And more
Find more content like what you just read:
-
Next generation network security
By: TechTarget ComputerWeekly.com
Type: eGuide
In this e-guide, we explore how network security, while remaining relevant, needs to change in its approach to meet the needs of new technologies and threats. We also look at why it should now be seen as one of several key elements of a modern cyber security strategy.
-
Network Security: Spotlight on Australia/New Zealand
By: TechTarget ComputerWeekly.com
Type: eGuide
In this e-guide learn more about how security leaders are turning to AI to take out the bad guys, how blockchain can help secure an IoT network, and whether network security strategies are keeping up with emerging cyber threats.
-
Five ways SASE and SD-WAN can help improve compliance
By: Hewlett Packard Enterprise
Type: White Paper
Security and compliance are top priorities for networking and security teams. With Zero Trust and SASE architectures, the network can become a security solution—improving connectivity experiences and compliance at the same time. Read this paper to learn how.
-
In 2017, the insider threat epidemic begins
By: TechTarget ComputerWeekly.com
Type: Essential Guide
Cyber security resiliency depends on detecting, deterring and mitigating insider threats. This report from the Institute for Critical Infrastructure Technology assesses the risks and potential solutions.
-
Royal Holloway: Purple team playbook – threat modeling for security testing
By: TechTarget ComputerWeekly.com
Type: Research Content
The reality of information security is that it is impossible to completely ensure that an attacker cannot get into the corporate network. Instead, companies should look at how they prepare and react to security attacks by gaining an understanding of how cyber criminals work by combining the talents of red teams and blue teams
-
How Can Healthcare Protect Against Zero-Day Attacks and What Does It Mean?
By: XtelligentMedia Healthcare
Type: eGuide
Zero-day attacks pose significant dangers to the healthcare sector, but defenders can mitigate risk by patching early and often.
-
Findings from MITRE Engenuity Enterprise ATT&CK Evaluations
By: Palo Alto Networks
Type: Infographic
The MITRE Engenuity Enterprise ATT&CK Evaluations test the threat detection, visibility and protection capabilities of security tools like Cortex XDR. So, how does Cortex XDR, by Palo Alto Networks, stack up against other tools? Find out in this infographic.
-
Security for network and infrastructure to protect your business
By: Reply
Type: Landing Page
While security measures can be built into the foundation of your network infrastructure, no precaution is perfect, and you still need an incident response team. Access this landing page to learn how Reply leverages networking technologies alongside SIEM and other security tools, in order to provide top-to-bottom security for the network.
-
12 essential features of advanced endpoint security tools
By: TechTarget ComputerWeekly.com
Type: eGuide
Endpoint protection of enterprise systems is an efficient method of managing software deployment and enforcing security policies. IT administrators can use endpoint security for a number of operation monitoring functions and data backup strategies. Here are 12 key features endpoint security products should include.
-
CW APAC: Buyer’s guide to SASE
By: TechTarget ComputerWeekly.com
Type: Essential Guide
Computer Weekly looks at the key benefits of SASE, how cloud security firm Zscaler aims to improve, the dangers of advanced persistent threat groups and why Australian businesses are waking up to the importance of security investment.
-
Palo Alto Networks 2nd Special Edition
By: Palo Alto Networks
Type: eBook
Most network and network security products on the market today weren’t designed to handle today’s security concerns. To address these challenges, Gartner came up with secure access service edge (SASE). Read this e-boo for an in-depth look at SASE and learn how you can secure your organization against today’s threats.
-
Towards more robust internetworks
By: TechTarget ComputerWeekly.com
Type: Essential Guide
This article in our Royal Holloway Security Series explains how graph theory can be used to model internetworks and improve their resilience against failures and attacks.
-
Considering key networking trends
By: Apcela
Type: eGuide
As your distributed network grows, you have to keep in mind that your attack surface does too. So, how can you ensure that your network is protected from increasing and complex cyberattacks? Staying up to date on the latest networking trends can help. Explore this E-Guide to access 5 key networking trends for 2023.
-
A Computer Weekly buyer's guide to perimeterless network security
By: TechTarget ComputerWeekly.com
Type: eGuide
Perimeterless network security is expanding the horizons of businesses looking to protect their data. In this buyer's guide, we look at how a secure perimeterless digital workplace is best achieved, explore the previous barriers perimeterless security can overcome and assess how traditional network security can be banished to the past.
-
Threat management: Essential guide
By: TechTarget ComputerWeekly.com
Type: eGuide
Security is about reducing risk, while assessing risk is all about understanding the cyber threats facing the enterprise, which in turn is about recognising that not all threats are external and that threat intelligence is a key element of threat management.
-
12 API security best practices
By: TechTarget ComputerWeekly.com
Type: Infographic
As more businesses enable access to data and services through APIs, these vectors present an attractive target for data theft and software attacks. Insecure APIs are a serious threat - the following 12 best practices can help expand and elevate the security of an organization's APIs.
-
Infographic: Network insights from ESG analysts
By: Meter
Type: ESG Infographic
As an organization’s network grows more complex, so does managing that network. To review 6 findings about the state of network management and visibility, browse this infographic by TechTarget’s Enterprise Strategy Group (ESG).
-
How SA Power Networks and CrowdStrike protect endpoints
By: CrowdStrike
Type: Case Study
SA Power Networks is South Australia’s sole electricity distributor. With escalating threats targeting critical infrastructure, SA Power Networks had to reckon with a new level of danger. Download this case study to learn how SA Power Networks uses the CrowdStrike Falcon platform for endpoint detection and response (EDR).
-
Running Cisco Firepower Virtual Firewall on EndaceProbe
By: Endace
Type: Product Demo
Your network, like every network, is in danger of being attacked by the many emerging and complex threats in the cyber landscape. So, how can you augment your defense measures? View this video to learn about one avenue toward enhanced network security: running Cisco Firepower Virtual Firewall on EndaceProbe.
-
Making Threat Intelligence Actionable with SOAR
By: Palo Alto Networks
Type: Research Content
SOAR is gaining traction as a way to improve security operations. Security and risk management leaders should evaluate how these tools can support and optimize their broader security operations capabilities. Read this Gartner Marketing Guide to learn more about sifting through the noise and choosing the best-fit SOAR tool for your needs.
-
Tightly Control and Manage Access to Applications and Services with Zero Trust
By: AT&T Cybersecurity
Type: Research Content
In this research report, AT&T’s Chief Security Officer (CSO) provides a unique perspective on implementing Zero Trust to control and manage access to applications and services. Read the full report to unlock this exclusive insight.
-
CW APAC: Expert advice on zero-trust security
By: TechTarget ComputerWeekly.com
Type: Ezine
Zero trust is a security model that eliminates the traditional perimeter and assumes that no user or device can be trusted until proven otherwise. In this handbook, Computer Weekly looks at how enterprises can take a zero-trust approach to securing their network, devices and workforce.
-
Leader’s guide to network management for educational IT
By: Auvik Networks, Inc.
Type: eBook
In this 16-page e-book, unlock recommendations for IT management in educational institutions.
-
Software-defined networking: Spotlight on ASEAN
By: TechTarget ComputerWeekly.com
Type: eGuide
In this e-guide, read about the state of adoption of Software-defined networking (SDN) in the ASEAN, how the technology can be used to secure critical systems and what you can do to get started.
-
9 essential elements of network security
By: TechTarget ComputerWeekly.com
Type: eGuide
Network security isn't a one-size-fits-all strategy. Dive into the various segments of network security, and learn how they overlap and interact with each other.
-
Cyber Security 2016 and beyond
By: TechTarget ComputerWeekly.com
Type: eGuide
Cyber risks to businesses increasingly feature in the news as a growing number of companies are targeted by attacks aimed at stealing personal and intellectual property data, but despite this coverage, studies show many companies are still ill-equipped to deal with these attacks.
-
Assessing your network-security posture: 6 considerations
By: Palo Alto Networks
Type: Research Content
With advanced threats crowding the cyber landscape, how can you secure your dispersed workforce? This research report by Palo Alto Networks’ Unit 42 unpacks 6 components of a strong network-security posture. Keep reading to discover those insights – and much more.
-
Royal Holloway: Security evaluation of network traffic mirroring in public cloud
By: TechTarget ComputerWeekly.com
Type: Research Content
This article in our Royal Holloway security series examines network traffic mirroring, demonstrating how the technique is being implemented in public cloud and the challenges it faces due to the inherent characteristics of the public cloud – security challenges that, if not addressed, can be detrimental to the security posture of an enterprise.
-
Strengthen Your Incident Response with Endace and Cisco
By: Endace
Type: Product Overview
When a threat enters your network, you need to investigate it quickly. Endace and Cisco have teamed up to help you do so. Read this overview to learn how you can enhance your incident response by integrating EndaceProbe’s network packet history with Cisco Stealthwatch.
-
7 characteristics of next-generation networking
By: TechTarget ComputerWeekly.com
Type: eGuide
The term next-generation networking refers to the process of designing network infrastructure with new, advanced technologies. Next-generation networks are flexible, nimble and secure architectures that are easier to manage. In this article, analysts offer their perspectives on which technologies help modernize network infrastructures.
-
Why 88% of organizations are struggling with public cloud infrastructure
By: Palo Alto Networks
Type: ESG Showcase
Discover in this ESG showcase how Google's Cloud NGFW Enterprise, powered by Palo Alto Networks, combines best-in-class cloud engineering with industry-leading security to help your organization efficiently and effectively apply network security policies at scale.
-
Why 88% of organizations are struggling with public cloud infrastructure
By: Palo Alto Networks
Type: ESG Showcase
Discover in this ESG showcase how Google's Cloud NGFW Enterprise, powered by Palo Alto Networks, combines best-in-class cloud engineering with industry-leading security to help your organization efficiently and effectively apply network security policies at scale.
-
How complacency kills mobile security
By: Lookout
Type: eGuide
In this expert guide, learn how a lackadaisical attitude towards mobile security can prove to be catastrophic to enterprises as mobile threats continue to exploit known vulnerabilities to gut profits.
-
A Computer Weekly Buyer's Guide to Digital Transformation
By: TechTarget ComputerWeekly.com
Type: eGuide
The future of organisations depends on their handling of digital transformation. In this14-page buyer's guide, Computer Weekly looks at how the IT operation can lead strategy, whether network security is keeping up and what can be learned from GE's digital journey.
-
Enhancing network edge security: 12-page e-book
By: Cradlepoint
Type: eBook
Yes, security threats are expanding – and so is the network edge. So, how can you ensure your organization’s users at the edge are as secure as possible? Tap into this e-book by Cradlepoint for guidance.
-
Infographic: SIEM vs. SOAR vs. XDR
By: TechTarget ComputerWeekly.com
Type: Infographic
IT security teams face an ongoing challenge: how best to collect data and turn it into intelligence to stop cyber threats. To help out, vendors have released generations of products that aggregate and analyse security events. In this infographic, learn the differences between SIEM, SOAR and XDR, and how these tools can help improve cyber security.
-
Bolster signature-based malware detection with machine learning
By: Sentinel Labs, Inc.
Type: eGuide
Discover how to enhance malicious code and behavior detection by combining signature-based detection with machine learning. Hear from experts Michael Cobb and Karen Scarfone about how to improve malware threat detection and 10 questions to ask endpoint security vendors.
-
The EVIL-ution of ransomware: What to know
By: Palo Alto Networks
Type: Video
Ransomware attacks are not going away any time soon. Having your organization believing and trusting in your security protocols is important, especially when it comes to securing your network. Watch this video to learn more about the evolution of ransomware and what you can do to protect yourself today.
-
How AI Technology Can Enhance Threat Detection and Response
By: Endace
Type: White Paper
Cyberthreats are fast moving and constantly evolving. Because of this, quick threat detection and response capabilities are critical for security teams. This white paper explores how AI technology can be key to achieving those capabilities. Browse to learn more.
-
The enterprise buyer’s guide to IoT security
By: Palo Alto Networks
Type: eGuide
46% of organizations are already embracing the Internet of Things (IoT) – and Gartner expects that number to rise dramatically in coming years. This e-guide provides an exclusive look at the IoT threat landscape and offers expert guidance for choosing the best-fit security tool to protect your IoT devices – read on to get started.
-
A Computer Weekly e-guide to SASE
By: TechTarget ComputerWeekly.com
Type: eGuide
Covid has changed everything. Yet while it has truly as introduced many new things to many spheres of activity, in terms of networking it has actually acted as an accelerant to phenomena that were just gaining momentum before the first lockdowns and stay at home orders were being made. secure access service edge (SASE) is one such case.
-
Texas district boosts IT security & efficiency
By: Fortinet, Inc.
Type: Case Study
Athens ISD in Texas enhanced its cybersecurity using Fortinet's Security Fabric. They selected Fortinet for easier firewall management, better network visibility, and integrated endpoint protection. Discover how Fortinet benefited Athens ISD in our case study.
-
Focus: Campus local area networks (LAN)
By: TechTarget ComputerWeekly.com
Type: eGuide
In this e-guide we will explore some of the key trends driving the market for campus LANs and ask how to implement one, find out how one user went about building a network from the ground up on a brand-new site, and look in-depth at some of the active suppliers in the market.
-
CW ANZ: Fix the weak links
By: TechTarget ComputerWeekly.com
Type: Ezine
In this edition of CW ANZ, we look at how Australia is securing its industrial control systems and how it is bridging the security gap between IT and OT teams. Read the issue now.
-
How to Solve Day 2 Operational Network Challenges in the Cloud
By: Aviatrix Systems
Type: Webcast
Watch this webinar to learn common day 2 challenges enterprise organizations face when operationalizing cloud workloads and how to get the network visibility and monitoring to resolve them. Then, explore how enterprises today are using Aviatrix to solve real-world networking security issues in the cloud.
-
Explore the value of Prisma Access
By: Palo Alto Networks
Type: Analyst Report
As more apps, servers & services are delivered from the cloud, organizations are reevaluating whether legacy point solutions can adequately scale & provide secure, reliable access for their users & locations. Security is being stepped up in response. Read this Forrester report to explore the value of Palo Alto Networks Prisma Access.
-
Detecting and Preventing the Most Challenging Cyberthreats
By: Endace
Type: Product Overview
Because of the colossal costs of security breaches, rapid and accurate incident response is imperative for businesses in every industry. This means that many organizations must augment their present strategies. Browse this overview to learn how Palo Alto Networks and Endace can help your business do so.