Visibility is defined by Webster’s Dictionary as the “capability of being readily noticed” or “the degree of clearness.” By network visibility or application visibility, we mean removing blind spots that are hiding the ability to readily… Continue reading
Detecting networks security threats is tough, and network security analysts’ jobs are getting tougher as threats and attacks become increasingly more sophisticated. To fight back, security architects integrate more security and monitoring tools into the… Continue reading
Modern computer networks have made it possible for people, businesses, and organizations to enjoy and benefit from the fast connectivity. This growth has also created challenges mainly cybercrime that represents the… Continue reading
Managing the long-term cost of computer networks security and monitoring tools is important. Simply put, tools are expensive. This is why up to 65% of businesses need to extend the life… Continue reading
The green padlock on websites doesn’t improve network security, so our expert addresses four ways to secure the modern network that move beyond the castle-wall analogy.
Users -particularly those who do… Continue reading
WiFi Protected Access (WPA) is a security standard for users of computing devices equipped with wireless internet connections. WPA was developed by the Wi-Fi Alliance to provide more sophisticated data encryption and better user authentication… Continue reading
Return on investment (ROI) is an important factor for new technology purchase decisions. However, having invested in many security and network… Continue reading
Implementing better network segmentation to improve security is a significant project for network operations, data center ops, and security teams. From dividing IoT from IT using micro-segmentation to avoiding over-segmentation, we call out best practices for maximizing success in this task.
• The segmentation requirements for an enterprise call for a highly customized design.
• Avoiding either over-segmenting or under-segmenting the network is achievable but requires a formal project.
• Outsourcing segmentation project planning tends to result in poor outcomes. Too often, trust is placed in less trusted components, often resulting in segmentation projects being delayed or restarted, or with results that place the enterprise at undue risk.
• Segment based on data sensitivity, location, and criticality.
• For virtualized environments, change the technology, but not the security principles.
• Create a segmentation architecture that will accommodate short-term technology changes, and will best allow for housing new resources, applications and data within the existing framework.
• Create zones to proactively house Internet of Things (IoT) and operational technology (OT). Continue reading