Network Security Resources

Network Security news and support resources, featuring the hottest solutions, technologies and vendors in the Network Security world. Use the powerful checkbox-driven menu to fine-tune the results to exactly what you are looking for in seconds!

  1. Home
  2. Tag "Network Security"

Microsoft’s New Networking Features in Azure Scale Sets

Today we are announcing a set of networking enhancements for Azure virtual machine scale sets. We are adding new ways to assign IP addresses, configure DNS, and assign network security. Azure scale sets were built to provide a fast and easy way to deploy and manage a collection of virtual machines. The initial implementation of […]

Microsoft Azure Network Security Documentation

We know that security is job one in the cloud and how important it is that you find accurate and timely information about Azure security. One of the best reasons to use Azure for your applications and services is to take advantage of Azure’s wide array of security tools and capabilities. These tools and capabilities […]

Cisco Extends Security Openness with McAfee Interoperability and New Technology Partners

Vendor “openness” drives better outcomes for the state of information security.  That’s why Cisco has invested and committed so heavily to our Cisco Security Technical Alliances (CSTA) program in recent years.  CSTA now has over 130 technology partners…a six-fold increase from where we started nearly four years ago.  It is a use-case driven technology partner […]

Citrix: Network Security – Winning the Battle, but Losing the War?

Citrix Systems
A cyber war is raging all around us, with increasingly capable warriors on both sides of the battlefront. On the attack are cybercriminals, malware, and all those who threaten both sensitive data and our digital lives. Defending against threats and attacks are cyberwarriors who are tasked with preserving the sanctity of intellectual property, privacy, and […]

Cisco: Breaking Down Cisco’s Biggest Innovation In the Past Decade

Just over a year ago, David McGrew, one of Cisco’s fellows, walked into my office to brief me on a project he was working on. The next 45 minutes were pretty unforgettable. He explained to me that he and his team had discovered how to solve one of the biggest challenges in network security: They […]

The ‘SambaCry’ Samba Vulnerability in Containers

There’s a new vulnerability which could affect containerized apps; this time it’s the Samba vulnerability affecting Linux networking. Samba allows non-Windows operating systems to share network shared folders, files, and printers with a Windows operating system. The network security space keeps catching people’s eyes recently with new exploits affecting popular systems. The Windows “WannaCry” ransomware […]

Microsoft: How Fileless malware challenges classic security solutions

A bank in Poland previously discovered unknown malware running on several of its computers, exposing a wave of attacks that affected organizations from at least 31 countries. What’s unique about this attack, is the usage of a piece of sophisticated malicious software, that managed to reside purely in the memory of a compromised machine, without […]

Login VSI is Finalist in Best of Citrix Synergy 2017 Awards

Login VSI
Login PI 2.0, with its unique Virtual User Technology, wins Finalist award in New Technology Category Login VSI, the industry leader in digital workplace performance management solutions for virtualized desktops, announced that Login PI 2.0, with its unique Virtual User Technology, was named a finalist as part of the Best of Citrix Synergy 2017 awards. […]

Cisco: Securing OpenStack Networking

Cloud Security is currently top of mind for IT. In this blog post, I will provide a 10 point checklist to help you secure your OpenStack Neutron networking service. Ensure that you use “Defense in depth” as the primary security strategy and deploy a series of defensive mechanisms, as no single method exists for successfully protecting your entire […]

VMware: Network Infrastructure and Cloud Strategy

Both by accident and design, cloud computing is redefining enterprise IT strategy. The proliferation of cloud services has been so rapid and pervasive that the majority of organizations don’t even know how many are involved in their business. A recent survey demonstrated that most enterprises believe they are engaged with just three cloud services, but […]

My Container Security Perspective of the Conference

Last week was my first time going to the DockerCon conference, which I’ve heard is now attracting a more serious enterprise deployment audience. It was an exciting experience hearing about several major announcements and participating in interesting sessions. NeuVector was a sponsor and had a booth at the conference. It was great to meet some […]

VMware: A Sense of Urgency: Adopting Network Virtualization

Traditional networking is failing to keep pace with the demands of business and technology innovation. The evidence is overwhelming. Seemingly every other day an enterprise makes the headlines with yet another network security breach. Less publicly, enterprises are also struggling to balance the demands of their business units for new cloud services with their IT […]

How to setup Citrix NetScaler Gateway SSL VPN in Azure as Point-to-Site VPN replacement, using multiple network interfaces

Christiaan Brinkhoff
Citrix just upgraded their NetScaler VPX in Microsoft Azure (official article). There were some limitations before the upgrade that I mentioned in one of my previous blogs. Most of them are now gone, what makes it possible to take NetScaler deployments in Azure to a new level! You can now add extra network interfaces, what […]

April Poll: What PAM Solution Do You Use & Recommend?

The beginning of April may be dominated by April Fool’s jokes, but for the poll this month we’re taking a more serious turn, because the topic is network security. Specifically, we’d like to know: what Privileged Access Management (PAM) software do you use and recommend? What’s PAM? PAM is a way for organizations to control […]

Visit Our Sponsors