Archive

Category Archives for "Network World Security"

What’s hot for Cisco in 2020

As the industry gets ready to gear up for 2020 things have been a  little disquieting in networking land.That’s because some key players – Arista and Juniper in particular – have been reporting business slowdowns as new deals have been smaller than expected and cloud providers haven’t been as free-spending as in the past.[Get regularly scheduled insights by signing up for Network World newsletters.] Worldwide IT spending has been on the slow side, Gartner said in October that worldwide IT spending is projected to total $3.7 trillion in 2019, an increase of 0.4% from 2018, the lowest growth forecast so far in 2019. The good news: global IT spending is expected to rebound in 2020 with forecast growth of 3.7%, primarily due to enterprise software spending, Gartner stated.To read this article in full, please click here

The VPN is dying, long live zero trust

The venerable VPN, which has for decades provided remote workers with a secure tunnel into the enterprise network, is facing extinction as enterprises migrate to a more agile, granular security framework called zero trust, which is better adapted to today’s world of digital business.VPNs are part of a security strategy based on the notion of a network perimeter; trusted employees are on the inside and untrusted employees are on the outside. But that model no longer works in a modern business environment where mobile employees access the network from a variety of inside or outside locations, and where corporate assets reside not behind the walls of an enterprise data center, but in multi-cloud environments.To read this article in full, please click here

IBM aims at hybrid cloud, enterprise security

IBM is taking aim at the challenging concept of securely locking-down company applications and data spread across multiple private and public clouds and on-premises locations.IBM is addressing this challenge with its Cloud Pak for Security, which features open-source technology for hunting threats, automation capabilities to speed response to cyberattacks, and the ability integrate customers’ existing point-product security-system information for better operational safekeeping – all under one roof.[ Learn how server disaggregation can boost data center efficiency and how Windows Server 2019 embraces hyperconverged data centers . | Get regularly scheduled insights by signing up for Network World newsletters. ] IBM Cloud Paks are bundles of Red Hat’s Kubernetes-based OpenShift Container Platform along with Red Hat Linux and a variety of connecting technologies to let enterprise customers deploy and manage containers on their choice of infrastructure, be it private or public clouds, including AWS, Microsoft Azure, Google Cloud Platform, Alibaba and IBM Cloud.To read this article in full, please click here

Fortinet CEO: Network and security technologies give rise to security-driven networking

The network and security industries both continue to evolve at a rate never seen before.  Historically, security and network operation teams have worked in parallel with one another, sometimes being at odds with each other's goals.However, that is changing as businesses rely on their networks to operate. It’s fair to say that today, for many companies, the network is the business. As this happens, network and security technologies need to be more closely aligned giving rise to the concept of security-driven networking.[Get regularly scheduled insights by signing up for Network World newsletters.] In this post, ZK Research had a chance to sit down with the co-founder and CEO of Fortinet Ken Xie to discuss the future of networking and security. To read this article in full, please click here

IoT in 2020: The awkward teenage years

Much of the hyperbole around the Internet of Things isn’t really hyperbole anymore – the instrumentation of everything from cars to combine harvesters to factories is just a fact of life these days. IoT’s here to stay.Yet despite the explosive growth – one widely cited prediction from Gartner says that the number of enterprise and automotive IoT endpoints will reach 5.8 billion in 2020 – the IoT market’s ability to address its known flaws and complications has progressed at a far more pedestrian pace. That means ongoing security woes and a lack of complete solutions are most of what can be safely predicted for the coming year.To read this article in full, please click here

Balancing patient security with healthcare innovation | TECH(talk)

Healthcare organizations are one of the most targeted verticals when it comes to cyberattacks. While those organizations must work to secure patients' sensitive data, it can also be helpful to analyze that data to improve patient outcomes. Jason James, CIO of Net Health, joins Juliet to discuss why attackers target healthcare organizations, Google's Project Nightingale and what it means for a tech giant to have access to the medical data of millions of people.

Red Hat Responds to Zombieload v2

Three Common Vulnerabilities and Exposures (CVEs) opened yesterday track three flaws in certain Intel processors, which, if exploited, can put sensitive data at risk.Of the flaws reported, the newly discovered Intel processor flaw is a variant of the Zombieload attack discovered earlier this year and is only known to affect Intel’s Cascade Lake chips.[Get regularly scheduled insights by signing up for Network World newsletters.] Red Hat strongly suggests that all Red Hat systems be updated even if they do not believe their configuration poses a direct threat, and it is providing resources to their customers and to the enterprise IT community.To read this article in full, please click here

SASE is more than a buzzword for BioIVT

It seems the latest buzzword coming from those analysts at Gartner is SASE (pronounced “sassy”), which stands for “Secure Access Service Edge.” Network World has published several articles recently to explain what SASE is (and perhaps isn’t). See Matt Conran’s The evolution to Secure Access Service Edge (SASE) is being driven by necessity as well as Zeus Kerravala’s article How SD-WAN is evolving into Secure Access Service Edge.To read this article in full, please click here

Cisco Meraki ups security with new switch, software

Cisco Meraki has introduced new hardware and software the company says will help customers more effectively support and secure a wide variety of distributed network resources.The new products, which include a raft of new security features as well a new class of switches and a cellular gateway will help Meraki address customers who perhaps don’t have the IT expertise nor staffing to support the increasing number of devices that need to be managed, said Lawrence Huang, vice president of product management at Cisco Meraki.Network pros react to new Cisco certification curriculum “Threat vectors are evolving and the way customers need to protect themselves need to evolve as well – how customers support applications and IoT devices exemplify the idea its not just one perimeter that needs protecting but a collection of micorperimenters,” Huang said.To read this article in full, please click here

1 22 23 24 25 26 319