Juniper bolsters wireless security; fights against encrypted malicious threats

Juniper is filling out its enterprise security portfolio this week by integrating support for its Mist wireless customers and adding the capability for customers to gain better visibility and control over encrypted traffic threats.With the new additions, Juniper is looking to buttress its ability to let users secure all traffic traversing the enterprise network via campus, WAN or data center. The moves are part of Juniper’s grand Connected Security platform that includes a variety of security products including its next-generation firewalls that promise to protect networked resources across infrastructure and endpoints.To read this article in full, please click here READ MORE HERE…

Read more

Cisco goes to the cloud with broad enterprise security service

Cisco has unveiled a cloud-based security platform it says will go a long way in helping customers protect their far-flung networked resources.Cisco describes the new SecureX service as offering  an open, cloud-native system that will let customers detect and remediate threats across Cisco and third-party products from a single interface. IT security teams can then automate and orchestrate security management across enterprise cloud, network and applications and end points.Network pros react to new Cisco certification curriculum
“Until now, security has largely been piecemeal with companies introducing new point products into their environments to address every new threat category that arises,” wrote Gee Rittenhouse senior vice president and general manager of Cisco’s Security Business Group in a blog about SecureX.To read this article in full, please click here READ MORE HERE…

Read more

5 Hot network-automation startups to watch

With the combined challenges of tight IT budgets and scarcer technical talent, it’s becoming imperative for enterprise network pros to embrace automation of processes and the way infrastructure responds to changing network traffic.Not only can automation help address these problems, they can also improve overall application-response time by anticipating and addressing looming congestion. Modern applications, such as virtual reality and artificial intelligence, and architectures that incorporate IoT and hybrid cloud have yet to reach their true potential because network capacity seems to always lag behind demand.  A common problem is that too much networking infrastructure is still manually maintained and managed, but major vendors are starting to addressing these  issues, as are startups that seek to break bottlenecks through automation.To read this article in full, please click here READ MORE HERE…

Read more

Who should lead the push for IoT security?

The ease with which internet of things devices can be compromised, coupled with the potentially extreme consequences of breaches, have prompted action from legislatures and regulators, but what group is best to decide?Both the makers of IoT devices and governments are aware of the security issues, but so far they haven’t come up with standardized ways to address them.[Get regularly scheduled insights by signing up for Network World newsletters.]
“The challenge of this market is that it’s moving so fast that no regulation is going to be able to keep pace with the devices that are being connected,” said Forrester vice president and research director Merritt Maxim. “Regulations that are definitive are easy to enforce and helpful, but they’ll quickly become outdated.”To read this article in full, please click here READ MORE HERE…

Read more

5 firewall features IT pros should know about but probably don’t

Firewalls continuously evolve to remain a staple of network security by incorporating functionality of standalone devices, embracing network-architecture changes, and integrating outside data sources to add intelligence to the decisions they make – a daunting wealth of possibilities that is difficult to keep track of.Because of this richness of features, next-generation firewalls are difficult to master fully, and important capabilities sometimes can be, and in practice are, overlooked.Here is a shortlist of new features IT pros should be aware of.To read this article in full, please click here READ MORE HERE…

Read more