3 real-world examples of IoT rolled out in the enterprise

Buying into IoT comes with a wealth of benefits, but adopting heavy use of the internet of things means more than plugging in devices and waiting for the data to pour in; it means modifying network infrastructure to accommodate them. Read about three real world examples of Internet of Things rolled out in enterprise on […]

Physical security must-dos for rock-solid network protection

It’s at the hardware level, the very bottom of the networking hierarchy, that your network is most vulnerable. A lost laptop, an open USB port, a simple network tap — all these can be a catalyst for quick and devastating data loss that no firewall can prevent. Read why companies should follow physical security measures […]

Is It Time to Upgrade the Network?

Read Heather Zindel and Nicole Watson’s article about whether it is time for companies to upgrade their network on Security Info Watch : While cyber attacks have dominated the news recently, we all know that physical security is just as critical a component of the security plan. A breach in physical security that puts corporate […]

Is your network ready for the Internet of Things?

Read Bob Violino’s article about the impact of Internet of Things on network security on Network World : Buying into IoT comes with a wealth of benefits, but adopting heavy use of the internet of things means more than plugging in devices and waiting for the data to pour in; it means modifying network infrastructure […]

Top network monitoring software and visibility tools

Networking performance monitoring and diagnostics (NPMD) software, whether running as an independent appliance or embedded in networking equipment, can help stave off productivity issues for internal corporate users as well as those interacting with the network from the outside. Read about the top network monitoring software and visibility tools for businesses on Network World.

Preparation Is Key for Partners Selling Network Security Services

Read why Helda Lopes says that preparation is the key for vendors to sell network security services on The Var Guy : Security, once purely an IT issue, has now catapulted into the board room, and we’re seeing purchasing decisions rise to the C-suite agenda. This shift is primarily driven by the recognition of top-level […]

Masterclass: keeping firms safe from cyber threats

Read Sacha Kavanagh’s article about how companies can keep themselves safe from cyber threats on Institution of Mechanical Engineers : As more and more ‘things’ are connected to the internet, the problem will only get worse. Many Internet of Things devices have inadequate security. That is a huge cause for concern when any device can represent […]

UK firms still relying on perimeter defences for cyber security

Despite the increasing number of data breaches and the looming GDPR compliance deadline, many companies are still relying on perimeter defences and are underinvesting in technologies to keep data safe, research has revealed. Read about the new fourth-annual Gemalto Data Security Confidence Index which reveals that 96% of UK businesses think that network perimeter security is effective […]

The Changing Face of Network Security

Not so long ago, the information network was a tangible entity to manage and secure. Today, in the age of the cloud and connected devices, network security is a whole new creature. Michael DeCesare, CEO of Forescout, discusses how to respond to this evolution. Read the interview with Michael DeCesare of Forescout who talks about network […]

Want to Find Malware in Your Network Sooner? Listen to Your Network: Cybersecurity Best Practices

One of the most telling statistics about cybersecurity and data breaches that we covered during Wednesday’s webcast was from last year’s Verizon Data Breach Incident Report which said that almost 93 percent of breach compromise incidents occur within minutes, with 11 percent of those occurring within seconds. Read why it is important to monitor your […]