Network Monitoring Research
-
Royal Holloway: Security evaluation of network traffic mirroring in public cloud
Sponsored by: ComputerWeekly.comThis article in our Royal Holloway security series examines network traffic mirroring, demonstrating how the technique is being implemented in public cloud and the challenges it faces due to the inherent characteristics of the public cloud – security challenges that, if not addressed, can be detrimental to the security posture of an enterprise.
-
13 steps for enabling secure remote work
Sponsored by: ComputerWeekly.comRemote working has become increasingly popular as it provides a way of enabling greater work flexibility and productivity, saving costs, retaining employees, and encouraging a healthy work-life balance. However, enabling it can be risky if not done with security in mind. In this infographic, we outline 13 steps to enable secure remote working.
-
Industrial Giant Discovers 200,000 Network Endpoints in One Day
Sponsored by: Beta SystemsOne of the world’s leading industrial companies planned to roll out IEEE 802.1X-based authentication. To pinpoint the scope and cost of this project, the industrial giant needed a precise categorization of all devices on its network. In this case study, learn why the company decided to use Auconet BICS to discover their network devices.
-
Network Security Management For IT and industrial Networks
Sponsored by: Beta SystemsAuconet Business Infrastructure Control Solution (BICS) for IT Security and its counterpart, BICS for Industrial Security, can help overcome key challenges of securing complex IT and industrial control networks. In this white paper, learn more about the security capabilities and features of Auconet BICS for IT and industrial control networks.
-
Business Infrastructure Control System – BICS
Sponsored by: Beta SystemsUp to 20% of network devices are undetected and unmanaged. This is dangerous; you cannot protect what you don’t see. In this brief, learn how The Business Infrastructure Control System (BICS) can help your organization find and control all your switches, routers, and endpoints, including those which popular NAC tools miss.
-
Network Management for IP-based Networks
Sponsored by: Beta SystemsIn this white paper, explore a high-level introduction to network management in the Auconent Business Infrastructure Control Solution (BICS) for office and industrial networks.
-
Network security in the post-pandemic era
Sponsored by: ComputerWeekly.comIn this e-guide, read more about the convergence of network management and security, and how network security will be impacted in the hybrid workplace, among other trends.
-
A Computer Weekly E-Guide to Network Management & Monitoring
Sponsored by: ComputerWeekly.comCovid has introduced many new things to many spheres of activity, in terms of networking it has actually acted as an accelerant to phenomena that were just gaining momentum before the first lockdowns and stay at home orders were being made. SD WAN, SASE and in particular digital transformation are key examples of that.
-
A Computer Weekly E-Guide to Network Management & Monitoring
Sponsored by: ComputerWeekly.comCovid has introduced many new things to many spheres of activity, in terms of networking it has actually acted as an accelerant to phenomena that were just gaining momentum before the first lockdowns and stay at home orders were being made. SD WAN, SASE and in particular digital transformation are key examples of that.
-
Setting up IT for success
Sponsored by: Aruba NetworksFor most businesses, harnessing the power of the Edge presents some formidable challenges. Aruba surveyed 2,400 IT leaders to get insight on what obstacles they are facing and where technology solutions can help empower them to adapt quickly and position their businesses for growth. Download this e-book to explore key findings from the survey.
-
Is the SD-WAN home office here to stay?
Sponsored by: SearchNetworking.comWhile VPN strategies are adequate in many cases, they can't provide the extra level of control, security and management that some companies require for networks that now include home offices. As a result, some organizations have deployed SD-WAN to business-critical home offices. In this e-guide, learn more about SD-WAN home offices.
-
IT's 5 Toughest Work From Home Challenges and How to Solve Them
Sponsored by: Aruba Networks2020 has forced many organisations to shift to a hybrid work model. Although this helped employees save time on their commutes, it has led to a number of network security challenges. In this e-book, explore the 5 biggest challenges IT teams are facing and learn how Aruba can help you get ahead of them.
-
CEO Impersonation
Sponsored by: Inky TechnologyThreat actors have realized that they can achieve at least a minimal rate of success by impersonating a company’s CEO or other high-level official in an email to an employee lower down in the organization. They will typically request money via wire transfer, but it does not stop there. Read this white paper to see some examples.
-
Dually Deceptive: Two New Phishing Scams Swimming by Your SEG
Sponsored by: Inky TechnologyPhishing scams have been more than pervasive in 2020, with the APWG counting 139,685 unique phishing threats in Q1 alone. As these attacks are quickly becoming more sophisticated, targeted and illusive, it’s a good idea to understand their complexity as they evolve. Jump into this short article to learn about two of these new scams.
-
How Your Government Agency Can Increase Productivity, Visibility, Security and Reduce Costs
Sponsored by: ServiceNowIT security teams in the public sector are challenged with providing security and innovation while driving down costs. Download this report to take a closer look at the challenges plaguing government agencies and discover a platform that can help to facilitate innovation without exhausting resources.
-
2021 Top Sd-Wan Edge Trends
Sponsored by: Aruba NetworksSASE, IoT, 5G, AI – these are all important terms to know as they evolve in conjunction with network architecture. The real question is: How will SD-WAN and the edge play their role in enterprise embarkment on these new technologies? What will drive adoption, and why? Immerse yourself in this e-book to learn 8 SD-WAN edge trends.
-
XDR: Extended Detection and Response
Sponsored by: Palo Alto NetworksExtended detection & response (XDR) has emerged in the wake of a need to detect, investigate and respond to threats across all threat vectors in a company’s infrastructure (network, endpoint and cloud) rather than just one. Dive into this white paper to learn about XDR and how it uses integration and orchestration as defense.
-
The Ultimate Guide to the MITRE ATT&CK Round 2 EDR Evaluation
Sponsored by: Palo Alto NetworksEndpoint detection and response (EDR) is quickly becoming a ubiquitous security technology in the age of remote work. As such, it is critical for security professionals to be aware of the vendors in the space. Tap into the Ultimate Guide to the MITRE ATT&CK Round 2 EDR Evaluation to help you pick the right tool for your organization.
-
Security Orchestration
Sponsored by: Palo Alto NetworksSecurity orchestration is a new term to the market, but it could simplify the lives of security professionals. It refers to the integration of security tools, unifying intelligence and automating tasks, resulting is a more effective security operations center that better detects and responds to threats. Dive into this e-book for a detailed guide.
-
IT/OT convergence is necessary, but not so simple
Sponsored by: ComputerWeekly.comThis handbook outlines best practices for building a secure IT/OT convergence and integration strategy, as well as insights into why people may just be the most critical piece of the IT/OT convergence security equation.
-
MicroScope – July 2020: MSPs lend a helping hand
Sponsored by: MicroScopeIn this issue, read about how the Covid-19 pandemic has allowed for managed services players to show their worth, and discover how the use of collaborative tools has made businesses consider how to make conference calls more engaging
-
Your Guide to Network Monitoring
Sponsored by: Catchpoint Systems Inc.Network monitoring provide organizations with exclusive insight into how well their network and its connected devices are performing. Download Your Guide to Network Monitoring to learn more about the benefits of end-user experience monitoring, how to build a network monitoring business case, and more.
-
A network automation roadmap to reap tech's best benefits
Sponsored by: SearchNetworking.comA network automation roadmap can help guide organizations through the Wild West of modern networking in order to reap benefits that automation can bring to employees, customers and partners. Reducing labor-intensive tasks does entail changing a network engineer's work, though.
-
Network Performance Issues are IT Pain Point Amid COVID-19
Sponsored by: NetAllyReliable home network performance is a top issue IT teams have dealt with amid the COVID-19 pandemic. With almost entire workforces working from disparate locations, remote networks are nearly impossible to monitor and manage. In this e-guide, learn how home network performance issues can relate to other IT problems.
-
Why You Should Consider Endpoint Detection & Response
Sponsored by: ClaranetEndpoint security has become an especially hot topic over the past few months. Organizations need to put clamps on hackers who attempt to breach their infrastructure. As such, traditional legacy endpoint security systems may not be able to stand up to modern threats. Read this expert guide to learn about endpoint detection & response.