Network security News
February 29, 2012
Security teams need to innovate and adapt to cloud, according to CISO panel
February 13, 2012
Attackers are finding an easy way into corporate networks often by targeting remote management weaknesses. Poorly configured software can lead to a data security breach.
January 27, 2012
Problems with data governance in the cloud aren’t much different than traditional outsourcing.
August 17, 2011
Patching routing and switching infrastructure in any organisation is often delayed, sometimes due to the potential impact on production systems and sometimes because the IT resources are simply too busy fighting fires.
Evaluate Network security Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
New survey shows the battle between corporate-issued devices versus personally owned smartphones and tablets is too close to call. Continue Reading
Explore the differences between consumer and enterprise password management products and learn pros and cons about the latest tools. Continue Reading
Product ReviewsPowered by IT Central Station
It updates quickly and works without its presence being felt, but the problem-solving documentation needs improvement.Powered by IT Central Station
Valuable Features: It gets up to date very fast. • Improvements to My Organization: Users do not feel any QualysGuard presence. • Room...Continue Reading
We've gained insight into vulnerabilities across our environment, but reports should be more customizable.Powered by IT Central Station
Valuable Features: The vulnerability scanning feature is valuable. • Improvements to My Organization: QualysGuard has provided us with a...Continue Reading
It has helped us to find vulnerability gaps, and compliance flaws, but reporting needs to be more intelligent and precise.Powered by IT Central Station
Valuable Features: Vulnerability Management Policy Compliance Web application Scanning Malware Detection Continuous Monitoring • Improvements...Continue Reading
Manage Network security
Learn to apply best practices and optimize your operations.
Bring your own device has a number of inherent security challenges. Expert Lisa Phifer explains how a mobile device management product can help your enterprise conquer BYOD risks. Continue Reading
The influx of iPad and Android tablets and smartphones after the holidays can really challenge network security in organizations that support BYOD. Continue Reading
Problem Solve Network security Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Expert Ed Moyle analyzes five key cloud computing security concerns vexing enterprises and the emerging products that are attempting to address them. Continue Reading
Firewalls and antivirus are ineffective in the face of APT attacks. Expert Nick Lewis offers suggestions for advanced persistent threat protection. Continue Reading
Enterprises face increasing risks from mega-DDoS attacks. Expert Brad Casey provides advice on high-bandwidth DDoS attack prevention. Continue Reading